&(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xfffffdef, 0x0, 0x0) [ 1082.840469][T10782] __x64_sys_io_uring_enter+0x74/0x80 [ 1082.845974][T10782] do_syscall_64+0x4a/0x90 [ 1082.850486][T10782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1082.856466][T10782] RIP: 0033:0x4665d9 [ 1082.860563][T10782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1082.860732][T10793] loop2: detected capacity change from 0 to 4 08:33:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xfffffff5, 0x0, 0x0) [ 1082.880541][T10782] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1082.880569][T10782] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1082.880583][T10782] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1082.910966][T10782] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1082.918937][T10782] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1082.926912][T10782] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="201020000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfc, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000007040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x225c17d03, 0x0, 0x0) 08:33:38 executing program 5 (fault-call:4 fault-nth:20): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1083.007774][T10812] loop0: detected capacity change from 0 to 4096 [ 1083.064188][T10812] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1083.094772][T10826] loop2: detected capacity change from 0 to 4 08:33:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x300, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000008040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xf2710c72fa, 0x0, 0x0) [ 1083.112963][T10835] FAULT_INJECTION: forcing a failure. [ 1083.112963][T10835] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.125658][T10835] CPU: 1 PID: 10835 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1083.134426][T10835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.144506][T10835] Call Trace: [ 1083.147808][T10835] dump_stack+0x137/0x19d [ 1083.152149][T10835] should_fail+0x23c/0x250 [ 1083.156659][T10835] ? io_req_prep_async+0xdc/0x410 [ 1083.161691][T10835] __should_failslab+0x81/0x90 [ 1083.166455][T10835] should_failslab+0x5/0x20 [ 1083.171033][T10835] __kmalloc+0x66/0x340 [ 1083.175269][T10835] ? io_req_prep_async+0xdc/0x410 [ 1083.180295][T10835] io_req_prep_async+0xdc/0x410 [ 1083.185147][T10835] io_submit_sqe+0x14ca/0x33a0 [ 1083.189966][T10835] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1083.195532][T10835] io_submit_sqes+0x5bd/0xbd0 [ 1083.200203][T10835] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1083.205653][T10835] ? fput+0x2d/0x130 [ 1083.209537][T10835] __x64_sys_io_uring_enter+0x74/0x80 [ 1083.214892][T10835] do_syscall_64+0x4a/0x90 [ 1083.219312][T10835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1083.225347][T10835] RIP: 0033:0x4665d9 [ 1083.229229][T10835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.248834][T10835] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1083.257254][T10835] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 08:33:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000003f0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000011040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:38 executing program 5 (fault-call:4 fault-nth:21): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1083.265222][T10835] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1083.273176][T10835] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1083.281191][T10835] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1083.289177][T10835] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200022000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x2000000000000, 0x0, 0x0) [ 1083.414145][T10856] FAULT_INJECTION: forcing a failure. [ 1083.414145][T10856] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.427756][T10856] CPU: 0 PID: 10856 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1083.436633][T10856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.446700][T10856] Call Trace: [ 1083.450010][T10856] dump_stack+0x137/0x19d [ 1083.454514][T10856] should_fail+0x23c/0x250 [ 1083.458972][T10856] ? io_req_prep_async+0xdc/0x410 08:33:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000018040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x500, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x4000000000000, 0x0, 0x0) [ 1083.464086][T10856] __should_failslab+0x81/0x90 [ 1083.468863][T10856] should_failslab+0x5/0x20 [ 1083.473382][T10856] __kmalloc+0x66/0x340 [ 1083.477553][T10856] ? io_req_prep_async+0xdc/0x410 [ 1083.482621][T10856] io_req_prep_async+0xdc/0x410 [ 1083.487487][T10856] io_submit_sqe+0x14ca/0x33a0 [ 1083.492283][T10856] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1083.497762][T10856] io_submit_sqes+0x5bd/0xbd0 [ 1083.502475][T10856] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1083.507952][T10856] ? fput+0x2d/0x130 [ 1083.511860][T10856] __x64_sys_io_uring_enter+0x74/0x80 [ 1083.517340][T10856] do_syscall_64+0x4a/0x90 [ 1083.521765][T10856] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1083.527675][T10856] RIP: 0033:0x4665d9 [ 1083.531665][T10856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.551288][T10856] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x100000000000000, 0x0, 0x0) [ 1083.559716][T10856] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1083.567709][T10856] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1083.575741][T10856] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1083.583757][T10856] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1083.591749][T10856] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x600, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:39 executing program 5 (fault-call:4 fault-nth:22): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000001c040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1083.609283][T10862] loop2: detected capacity change from 0 to 4 [ 1083.626023][T10864] loop0: detected capacity change from 0 to 4096 [ 1083.692582][T10864] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1083.723955][T10902] FAULT_INJECTION: forcing a failure. [ 1083.723955][T10902] name failslab, interval 1, probability 0, space 0, times 0 08:33:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000023f0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000026040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x700, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200025000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1083.736632][T10902] CPU: 0 PID: 10902 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1083.745590][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.755709][T10902] Call Trace: [ 1083.759065][T10902] dump_stack+0x137/0x19d [ 1083.763528][T10902] should_fail+0x23c/0x250 [ 1083.767949][T10902] ? io_req_prep_async+0xdc/0x410 [ 1083.772972][T10902] __should_failslab+0x81/0x90 [ 1083.777751][T10902] should_failslab+0x5/0x20 [ 1083.782377][T10902] __kmalloc+0x66/0x340 [ 1083.786602][T10902] ? io_req_prep_async+0xdc/0x410 08:33:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x200000000000000, 0x0, 0x0) [ 1083.791635][T10902] io_req_prep_async+0xdc/0x410 [ 1083.796500][T10902] io_submit_sqe+0x14ca/0x33a0 [ 1083.801275][T10902] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1083.806744][T10902] io_submit_sqes+0x5bd/0xbd0 [ 1083.811424][T10902] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1083.816947][T10902] ? fput+0x2d/0x130 [ 1083.820839][T10902] __x64_sys_io_uring_enter+0x74/0x80 [ 1083.826287][T10902] do_syscall_64+0x4a/0x90 [ 1083.830729][T10902] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1083.836684][T10902] RIP: 0033:0x4665d9 08:33:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x300000000000000, 0x0, 0x0) [ 1083.840594][T10902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.860206][T10902] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1083.868700][T10902] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1083.876718][T10902] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1083.884692][T10902] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x810, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:39 executing program 5 (fault-call:4 fault-nth:23): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000533040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x37dc12502000000, 0x0, 0x0) [ 1083.892687][T10902] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1083.900713][T10902] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1083.920410][T10920] loop2: detected capacity change from 0 to 4 08:33:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xf00, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1084.015363][T10939] FAULT_INJECTION: forcing a failure. [ 1084.015363][T10939] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.028172][T10939] CPU: 0 PID: 10939 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1084.036946][T10939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.047083][T10939] Call Trace: [ 1084.050381][T10939] dump_stack+0x137/0x19d [ 1084.053346][T10940] loop0: detected capacity change from 0 to 4096 [ 1084.054704][T10939] should_fail+0x23c/0x250 08:33:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000003f040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1084.065451][T10939] ? io_req_prep_async+0xdc/0x410 [ 1084.070551][T10939] __should_failslab+0x81/0x90 [ 1084.075400][T10939] should_failslab+0x5/0x20 [ 1084.079916][T10939] __kmalloc+0x66/0x340 [ 1084.084079][T10939] ? io_req_prep_async+0xdc/0x410 [ 1084.089107][T10939] io_req_prep_async+0xdc/0x410 [ 1084.094023][T10939] io_submit_sqe+0x14ca/0x33a0 [ 1084.098828][T10939] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1084.104367][T10939] io_submit_sqes+0x5bd/0xbd0 [ 1084.109046][T10939] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1084.114544][T10939] ? fput+0x2d/0x130 [ 1084.118472][T10939] __x64_sys_io_uring_enter+0x74/0x80 [ 1084.123856][T10939] do_syscall_64+0x4a/0x90 [ 1084.128363][T10939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1084.134260][T10939] RIP: 0033:0x4665d9 [ 1084.138149][T10939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.157851][T10939] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1084.166275][T10939] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1084.169968][T10940] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1084.174297][T10939] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1084.174313][T10939] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.174326][T10939] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:33:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000400000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20002e000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x1008, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x400000000000000, 0x0, 0x0) 08:33:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000080040040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:39 executing program 5 (fault-call:4 fault-nth:24): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1084.174339][T10939] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x500000000000000, 0x0, 0x0) 08:33:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000f0ff7f040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x1100, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1084.351077][T10981] loop2: detected capacity change from 0 to 4 [ 1084.358860][T10980] FAULT_INJECTION: forcing a failure. [ 1084.358860][T10980] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.366501][T10984] loop0: detected capacity change from 0 to 4096 [ 1084.371613][T10980] CPU: 1 PID: 10980 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1084.386827][T10980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.396939][T10980] Call Trace: [ 1084.400217][T10980] dump_stack+0x137/0x19d [ 1084.404550][T10980] should_fail+0x23c/0x250 [ 1084.408965][T10980] ? io_req_prep_async+0xdc/0x410 [ 1084.414078][T10980] __should_failslab+0x81/0x90 [ 1084.418910][T10980] should_failslab+0x5/0x20 [ 1084.423420][T10980] __kmalloc+0x66/0x340 [ 1084.427578][T10980] ? io_req_prep_async+0xdc/0x410 [ 1084.432609][T10980] io_req_prep_async+0xdc/0x410 [ 1084.437482][T10980] io_submit_sqe+0x14ca/0x33a0 [ 1084.442321][T10980] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1084.447797][T10980] io_submit_sqes+0x5bd/0xbd0 [ 1084.452477][T10980] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1084.457957][T10980] ? fput+0x2d/0x130 [ 1084.461848][T10980] __x64_sys_io_uring_enter+0x74/0x80 [ 1084.467219][T10980] do_syscall_64+0x4a/0x90 [ 1084.471706][T10980] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1084.477635][T10980] RIP: 0033:0x4665d9 [ 1084.481537][T10980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:40 executing program 5 (fault-call:4 fault-nth:25): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1084.501188][T10980] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1084.509667][T10980] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1084.517638][T10980] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1084.525660][T10980] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.533732][T10980] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1084.541720][T10980] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20003f000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x600000000000000, 0x0, 0x0) [ 1084.580766][T10984] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1084.661603][T11010] FAULT_INJECTION: forcing a failure. [ 1084.661603][T11010] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.674276][T11010] CPU: 0 PID: 11010 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1084.683118][T11010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.693180][T11010] Call Trace: [ 1084.696462][T11010] dump_stack+0x137/0x19d [ 1084.699501][T11012] loop2: detected capacity change from 0 to 4 [ 1084.700794][T11010] should_fail+0x23c/0x250 [ 1084.711263][T11010] ? io_req_prep_async+0xdc/0x410 [ 1084.716295][T11010] __should_failslab+0x81/0x90 [ 1084.721096][T11010] should_failslab+0x5/0x20 [ 1084.725610][T11010] __kmalloc+0x66/0x340 [ 1084.729769][T11010] ? io_req_prep_async+0xdc/0x410 [ 1084.734793][T11010] io_req_prep_async+0xdc/0x410 [ 1084.739658][T11010] io_submit_sqe+0x14ca/0x33a0 [ 1084.744432][T11010] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1084.749970][T11010] io_submit_sqes+0x5bd/0xbd0 [ 1084.754665][T11010] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1084.760129][T11010] ? fput+0x2d/0x130 [ 1084.764037][T11010] __x64_sys_io_uring_enter+0x74/0x80 [ 1084.769560][T11010] do_syscall_64+0x4a/0x90 [ 1084.773980][T11010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1084.779897][T11010] RIP: 0033:0x4665d9 [ 1084.783793][T11010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.803503][T11010] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000002440000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000480040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x2800, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x700000000000000, 0x0, 0x0) 08:33:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200040000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:40 executing program 5 (fault-call:4 fault-nth:26): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000200ac0040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1084.812004][T11010] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1084.819982][T11010] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1084.827957][T11010] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.835998][T11010] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1084.844348][T11010] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x3f00, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1084.964129][T11037] FAULT_INJECTION: forcing a failure. [ 1084.964129][T11037] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.976811][T11037] CPU: 1 PID: 11037 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1084.985626][T11037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.996732][T11037] Call Trace: [ 1085.000066][T11037] dump_stack+0x137/0x19d [ 1085.004472][T11037] should_fail+0x23c/0x250 [ 1085.008889][T11037] __should_failslab+0x81/0x90 [ 1085.015465][T11037] should_failslab+0x5/0x20 [ 1085.020040][T11037] kmem_cache_alloc_bulk+0x40/0x340 [ 1085.025254][T11037] io_submit_sqes+0x4a3/0xbd0 [ 1085.029963][T11037] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1085.033935][T11043] loop0: detected capacity change from 0 to 4096 [ 1085.035429][T11037] ? fput+0x2d/0x130 [ 1085.035454][T11037] __x64_sys_io_uring_enter+0x74/0x80 [ 1085.051006][T11037] do_syscall_64+0x4a/0x90 [ 1085.055460][T11037] entry_SYSCALL_64_after_hwframe+0x44/0xae 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x4000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x800000000000000, 0x0, 0x0) [ 1085.061371][T11037] RIP: 0033:0x4665d9 [ 1085.065269][T11037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.084945][T11037] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1085.093374][T11037] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1085.101414][T11037] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000fffffdef040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x6000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1085.109486][T11037] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.117538][T11037] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1085.125568][T11037] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1085.152003][T11046] loop2: detected capacity change from 0 to 4 08:33:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000002450000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:40 executing program 5 (fault-call:4 fault-nth:27): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200048000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x80fe, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000fffffffe040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x900000000000000, 0x0, 0x0) [ 1085.178147][T11043] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfc00, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000effdffff040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1085.324672][T11081] loop2: detected capacity change from 0 to 4 [ 1085.364055][T11094] FAULT_INJECTION: forcing a failure. [ 1085.364055][T11094] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.376823][T11094] CPU: 0 PID: 11094 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1085.385718][T11094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.395781][T11094] Call Trace: [ 1085.399065][T11094] dump_stack+0x137/0x19d [ 1085.403427][T11094] should_fail+0x23c/0x250 [ 1085.407866][T11094] ? io_req_prep_async+0xdc/0x410 [ 1085.412896][T11094] __should_failslab+0x81/0x90 [ 1085.417666][T11094] should_failslab+0x5/0x20 08:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xa00000000000000, 0x0, 0x0) 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfe80, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000feffffff040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1085.422240][T11094] __kmalloc+0x66/0x340 [ 1085.426408][T11094] ? io_req_prep_async+0xdc/0x410 [ 1085.431450][T11094] io_req_prep_async+0xdc/0x410 [ 1085.436361][T11094] io_submit_sqe+0x14ca/0x33a0 [ 1085.441134][T11094] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1085.446602][T11094] io_submit_sqes+0x5bd/0xbd0 [ 1085.450135][T11101] loop0: detected capacity change from 0 to 4096 [ 1085.451284][T11094] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1085.463062][T11094] ? fput+0x2d/0x130 [ 1085.467022][T11094] __x64_sys_io_uring_enter+0x74/0x80 08:33:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xff00, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1085.472409][T11094] do_syscall_64+0x4a/0x90 [ 1085.476847][T11094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1085.482853][T11094] RIP: 0033:0x4665d9 [ 1085.486745][T11094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.506434][T11094] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1085.514857][T11094] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1085.522836][T11094] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1085.530917][T11094] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.538922][T11094] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1085.547031][T11094] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000002460000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000020004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20004c000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xb00000000000000, 0x0, 0x0) 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x34000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:41 executing program 5 (fault-call:4 fault-nth:28): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1085.584109][T11101] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x40000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000030004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x50000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xc00000000000000, 0x0, 0x0) [ 1085.695063][T11143] loop0: detected capacity change from 0 to 4096 [ 1085.716838][T11143] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1085.757081][T11149] loop2: detected capacity change from 0 to 4 [ 1085.792284][T11151] FAULT_INJECTION: forcing a failure. [ 1085.792284][T11151] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.805019][T11151] CPU: 1 PID: 11151 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1085.813796][T11151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.823870][T11151] Call Trace: [ 1085.827194][T11151] dump_stack+0x137/0x19d [ 1085.831541][T11151] should_fail+0x23c/0x250 [ 1085.835961][T11151] ? io_req_prep_async+0xdc/0x410 [ 1085.840984][T11151] __should_failslab+0x81/0x90 [ 1085.845934][T11151] should_failslab+0x5/0x20 [ 1085.850501][T11151] __kmalloc+0x66/0x340 [ 1085.854714][T11151] ? io_req_prep_async+0xdc/0x410 [ 1085.859755][T11151] io_req_prep_async+0xdc/0x410 [ 1085.864656][T11151] io_submit_sqe+0x14ca/0x33a0 [ 1085.869417][T11151] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1085.874876][T11151] io_submit_sqes+0x5bd/0xbd0 [ 1085.879586][T11151] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1085.885067][T11151] ? fput+0x2d/0x130 [ 1085.888963][T11151] __x64_sys_io_uring_enter+0x74/0x80 [ 1085.894342][T11151] do_syscall_64+0x4a/0x90 [ 1085.898762][T11151] ? irqentry_exit_to_user_mode+0x5/0x20 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x100000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000002470000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1085.904398][T11151] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1085.910292][T11151] RIP: 0033:0x4665d9 [ 1085.914224][T11151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.933837][T11151] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1085.942268][T11151] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 08:33:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000020000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1085.950351][T11151] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1085.958325][T11151] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.966416][T11151] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1085.974466][T11151] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:41 executing program 5 (fault-call:4 fault-nth:29): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200060000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xd00000000000000, 0x0, 0x0) 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x400300, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1086.064597][T11180] loop0: detected capacity change from 0 to 4096 [ 1086.096762][T11189] FAULT_INJECTION: forcing a failure. [ 1086.096762][T11189] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.110159][T11189] CPU: 1 PID: 11189 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1086.118930][T11189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.128987][T11189] Call Trace: [ 1086.132274][T11189] dump_stack+0x137/0x19d [ 1086.136607][T11189] should_fail+0x23c/0x250 [ 1086.141022][T11189] ? io_req_prep_async+0xdc/0x410 [ 1086.146092][T11189] __should_failslab+0x81/0x90 [ 1086.151823][T11189] should_failslab+0x5/0x20 [ 1086.156335][T11189] __kmalloc+0x66/0x340 [ 1086.160555][T11189] ? io_req_prep_async+0xdc/0x410 [ 1086.165609][T11189] io_req_prep_async+0xdc/0x410 [ 1086.170515][T11189] io_submit_sqe+0x14ca/0x33a0 [ 1086.175283][T11189] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1086.182406][T11189] io_submit_sqes+0x5bd/0xbd0 [ 1086.187143][T11189] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1086.192618][T11189] ? fput+0x2d/0x130 [ 1086.196526][T11189] __x64_sys_io_uring_enter+0x74/0x80 [ 1086.201923][T11189] do_syscall_64+0x4a/0x90 [ 1086.206368][T11189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1086.212265][T11189] RIP: 0033:0x4665d9 [ 1086.216153][T11189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.235840][T11189] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1086.244259][T11189] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1086.252429][T11189] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000030000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1086.260421][T11189] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.268497][T11189] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1086.276521][T11189] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:41 executing program 5 (fault-call:4 fault-nth:30): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x1000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xe00000000000000, 0x0, 0x0) [ 1086.354841][T11203] loop2: detected capacity change from 0 to 4 [ 1086.363669][T11180] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000040000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200068000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1086.416135][T11216] FAULT_INJECTION: forcing a failure. [ 1086.416135][T11216] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.428855][T11216] CPU: 0 PID: 11216 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1086.437654][T11216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.447711][T11216] Call Trace: [ 1086.450993][T11216] dump_stack+0x137/0x19d [ 1086.455380][T11216] should_fail+0x23c/0x250 [ 1086.459796][T11216] ? io_req_prep_async+0xdc/0x410 08:33:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000480000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x2000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1086.464927][T11216] __should_failslab+0x81/0x90 [ 1086.469710][T11216] should_failslab+0x5/0x20 [ 1086.474251][T11216] __kmalloc+0x66/0x340 [ 1086.478411][T11216] ? io_req_prep_async+0xdc/0x410 [ 1086.483474][T11216] io_req_prep_async+0xdc/0x410 [ 1086.488343][T11216] io_submit_sqe+0x14ca/0x33a0 [ 1086.493114][T11216] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1086.498583][T11216] io_submit_sqes+0x5bd/0xbd0 [ 1086.503269][T11216] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1086.508743][T11216] ? fput+0x2d/0x130 08:33:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xf00000000000000, 0x0, 0x0) 08:33:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000050000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1086.512640][T11216] __x64_sys_io_uring_enter+0x74/0x80 [ 1086.518096][T11216] do_syscall_64+0x4a/0x90 [ 1086.522529][T11216] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1086.528437][T11216] RIP: 0033:0x4665d9 [ 1086.532347][T11216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.551979][T11216] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000060000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1000000000000000, 0x0, 0x0) [ 1086.560460][T11216] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1086.568434][T11216] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1086.576507][T11216] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.584498][T11216] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1086.592490][T11216] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:42 executing program 5 (fault-call:4 fault-nth:31): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x3000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000004c0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1086.657636][T11235] loop2: detected capacity change from 0 to 4 [ 1086.695314][T11244] loop0: detected capacity change from 0 to 4096 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000070000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20006c000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1086.708728][T11244] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x4000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1086.775128][T11262] FAULT_INJECTION: forcing a failure. [ 1086.775128][T11262] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.787798][T11262] CPU: 1 PID: 11262 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1086.796577][T11262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.806637][T11262] Call Trace: [ 1086.809919][T11262] dump_stack+0x137/0x19d [ 1086.814270][T11262] should_fail+0x23c/0x250 [ 1086.818729][T11262] ? io_req_prep_async+0xdc/0x410 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x5000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1086.823791][T11262] __should_failslab+0x81/0x90 [ 1086.828565][T11262] should_failslab+0x5/0x20 [ 1086.833092][T11262] __kmalloc+0x66/0x340 [ 1086.837295][T11262] ? io_req_prep_async+0xdc/0x410 [ 1086.842348][T11262] io_req_prep_async+0xdc/0x410 [ 1086.847227][T11262] io_submit_sqe+0x14ca/0x33a0 [ 1086.851999][T11262] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1086.857473][T11262] io_submit_sqes+0x5bd/0xbd0 [ 1086.862163][T11262] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1086.867635][T11262] ? fput+0x2d/0x130 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000080000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1086.871552][T11262] __x64_sys_io_uring_enter+0x74/0x80 [ 1086.876954][T11262] do_syscall_64+0x4a/0x90 [ 1086.881406][T11262] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1086.887308][T11262] RIP: 0033:0x4665d9 [ 1086.892703][T11262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.905366][T11270] loop2: detected capacity change from 0 to 4 08:33:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1100000000000000, 0x0, 0x0) [ 1086.912459][T11262] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1086.912487][T11262] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1086.912500][T11262] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1086.942893][T11262] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.950878][T11262] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1086.958931][T11262] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000024e0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200074000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 5 (fault-call:4 fault-nth:32): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1086.977621][T11274] loop0: detected capacity change from 0 to 4096 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000110000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x6000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1200000000000000, 0x0, 0x0) 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x7000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1087.113355][T11305] loop2: detected capacity change from 0 to 4 [ 1087.146652][T11308] FAULT_INJECTION: forcing a failure. [ 1087.146652][T11308] name failslab, interval 1, probability 0, space 0, times 0 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000180000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x8000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1087.159428][T11308] CPU: 1 PID: 11308 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1087.168280][T11308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.171285][T11310] loop0: detected capacity change from 0 to 4096 [ 1087.178344][T11308] Call Trace: [ 1087.178357][T11308] dump_stack+0x137/0x19d [ 1087.178384][T11308] should_fail+0x23c/0x250 [ 1087.196688][T11308] ? io_req_prep_async+0xdc/0x410 [ 1087.201715][T11308] __should_failslab+0x81/0x90 [ 1087.206582][T11308] should_failslab+0x5/0x20 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000001c0000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000260000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1087.211123][T11308] __kmalloc+0x66/0x340 [ 1087.215284][T11308] ? io_req_prep_async+0xdc/0x410 [ 1087.220383][T11308] io_req_prep_async+0xdc/0x410 [ 1087.225240][T11308] io_submit_sqe+0x14ca/0x33a0 [ 1087.230006][T11308] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1087.235551][T11308] io_submit_sqes+0x5bd/0xbd0 [ 1087.240275][T11308] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1087.245764][T11308] ? fput+0x2d/0x130 [ 1087.249662][T11308] __x64_sys_io_uring_enter+0x74/0x80 [ 1087.255068][T11308] do_syscall_64+0x4a/0x90 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000fe0000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1087.259654][T11308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.265589][T11308] RIP: 0033:0x4665d9 [ 1087.269487][T11308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.289126][T11308] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1087.297579][T11308] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1087.305606][T11308] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000024f0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1087.313662][T11308] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.321637][T11308] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1087.329853][T11308] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20007a000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 5 (fault-call:4 fault-nth:33): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000040200040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xf000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1300000000000000, 0x0, 0x0) 08:33:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x10000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000600000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1087.458206][T11353] loop0: detected capacity change from 0 to 4096 [ 1087.475978][T11358] loop2: detected capacity change from 0 to 4 08:33:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20c0ed000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1400000000000000, 0x0, 0x0) [ 1087.545725][T11366] FAULT_INJECTION: forcing a failure. [ 1087.545725][T11366] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.558443][T11366] CPU: 1 PID: 11366 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1087.567217][T11366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.577282][T11366] Call Trace: [ 1087.580558][T11366] dump_stack+0x137/0x19d [ 1087.584889][T11366] should_fail+0x23c/0x250 [ 1087.589312][T11366] ? io_req_prep_async+0xdc/0x410 [ 1087.594346][T11366] __should_failslab+0x81/0x90 [ 1087.599152][T11366] should_failslab+0x5/0x20 [ 1087.603698][T11366] __kmalloc+0x66/0x340 [ 1087.607869][T11366] ? io_req_prep_async+0xdc/0x410 [ 1087.612896][T11366] io_req_prep_async+0xdc/0x410 [ 1087.617751][T11366] io_submit_sqe+0x14ca/0x33a0 [ 1087.622512][T11366] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1087.627987][T11366] io_submit_sqes+0x5bd/0xbd0 [ 1087.632661][T11366] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1087.638129][T11366] ? fput+0x2d/0x130 [ 1087.642020][T11366] __x64_sys_io_uring_enter+0x74/0x80 [ 1087.647396][T11366] do_syscall_64+0x4a/0x90 [ 1087.651879][T11366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.657778][T11366] RIP: 0033:0x4665d9 [ 1087.661669][T11366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.681290][T11366] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000300040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1500000000000000, 0x0, 0x0) 08:33:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x10000120, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1087.689749][T11366] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1087.697724][T11366] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1087.705734][T11366] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.713747][T11366] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1087.721725][T11366] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000020400040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:43 executing program 5 (fault-call:4 fault-nth:34): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1600000000000000, 0x0, 0x0) 08:33:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x10080000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1087.785439][T11384] loop2: detected capacity change from 0 to 4 08:33:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000060400040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2001ee000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1087.909322][T11414] loop0: detected capacity change from 0 to 4096 [ 1087.919169][T11412] FAULT_INJECTION: forcing a failure. [ 1087.919169][T11412] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.932037][T11412] CPU: 1 PID: 11412 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1087.940873][T11412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.951628][T11412] Call Trace: [ 1087.954904][T11412] dump_stack+0x137/0x19d [ 1087.959264][T11412] should_fail+0x23c/0x250 [ 1087.963771][T11412] ? io_req_prep_async+0xdc/0x410 [ 1087.968849][T11412] __should_failslab+0x81/0x90 [ 1087.973628][T11412] should_failslab+0x5/0x20 [ 1087.978163][T11412] __kmalloc+0x66/0x340 [ 1087.982322][T11412] ? io_req_prep_async+0xdc/0x410 [ 1087.987358][T11412] io_req_prep_async+0xdc/0x410 [ 1087.992280][T11412] io_submit_sqe+0x14ca/0x33a0 [ 1087.997066][T11412] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1088.002528][T11412] io_submit_sqes+0x5bd/0xbd0 [ 1088.007209][T11412] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1088.012762][T11412] ? fput+0x2d/0x130 [ 1088.016698][T11412] __x64_sys_io_uring_enter+0x74/0x80 [ 1088.022147][T11412] do_syscall_64+0x4a/0x90 [ 1088.026632][T11412] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.032548][T11412] RIP: 0033:0x4665d9 [ 1088.036441][T11412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.056061][T11412] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1088.064478][T11412] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1088.070051][T11428] loop2: detected capacity change from 0 to 4 [ 1088.072462][T11412] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1088.072480][T11412] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.072494][T11412] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:33:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000680000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x11000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1700000000000000, 0x0, 0x0) 08:33:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000800400040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:43 executing program 5 (fault-call:4 fault-nth:35): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2001f6000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1088.102597][T11412] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1800000000000000, 0x0, 0x0) 08:33:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000500040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x20010010, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1088.214470][T11449] loop2: detected capacity change from 0 to 4 [ 1088.222090][T11450] FAULT_INJECTION: forcing a failure. [ 1088.222090][T11450] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.234857][T11450] CPU: 1 PID: 11450 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1088.243641][T11450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.253713][T11450] Call Trace: [ 1088.257252][T11450] dump_stack+0x137/0x19d [ 1088.261647][T11450] should_fail+0x23c/0x250 [ 1088.266068][T11450] __should_failslab+0x81/0x90 [ 1088.270847][T11450] should_failslab+0x5/0x20 [ 1088.275410][T11450] kmem_cache_alloc_bulk+0x40/0x340 [ 1088.280683][T11450] io_submit_sqes+0x4a3/0xbd0 [ 1088.281123][T11456] loop0: detected capacity change from 0 to 4096 [ 1088.285366][T11450] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1088.285398][T11450] ? fput+0x2d/0x130 [ 1088.301107][T11450] __x64_sys_io_uring_enter+0x74/0x80 [ 1088.306489][T11450] do_syscall_64+0x4a/0x90 [ 1088.310931][T11450] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.316890][T11450] RIP: 0033:0x4665d9 [ 1088.320803][T11450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.340420][T11450] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1088.348843][T11450] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1088.356831][T11450] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:43 executing program 5 (fault-call:4 fault-nth:36): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1900000000000000, 0x0, 0x0) 08:33:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x28000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1088.364810][T11450] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.372784][T11450] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1088.380794][T11450] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000006c0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000330500040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1088.488750][T11483] FAULT_INJECTION: forcing a failure. [ 1088.488750][T11483] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.501433][T11483] CPU: 0 PID: 11483 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1088.510211][T11483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.520273][T11483] Call Trace: [ 1088.523608][T11483] dump_stack+0x137/0x19d [ 1088.528032][T11483] should_fail+0x23c/0x250 [ 1088.532501][T11483] ? io_req_prep_async+0xdc/0x410 [ 1088.537539][T11483] __should_failslab+0x81/0x90 [ 1088.542322][T11483] should_failslab+0x5/0x20 [ 1088.546847][T11483] __kmalloc+0x66/0x340 [ 1088.551080][T11483] ? io_req_prep_async+0xdc/0x410 [ 1088.556107][T11483] io_req_prep_async+0xdc/0x410 [ 1088.560959][T11483] io_submit_sqe+0x14ca/0x33a0 [ 1088.565751][T11483] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1088.571219][T11483] io_submit_sqes+0x5bd/0xbd0 [ 1088.576027][T11483] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1088.581520][T11483] ? fput+0x2d/0x130 [ 1088.585420][T11483] __x64_sys_io_uring_enter+0x74/0x80 [ 1088.590835][T11483] do_syscall_64+0x4a/0x90 [ 1088.595386][T11483] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.601286][T11483] RIP: 0033:0x4665d9 [ 1088.605188][T11483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.624816][T11483] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x3f000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffe000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1a00000000000000, 0x0, 0x0) 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x40000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1088.633277][T11483] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1088.641257][T11483] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1088.649263][T11483] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.657239][T11483] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1088.665216][T11483] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000600040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000740000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:44 executing program 5 (fault-call:4 fault-nth:37): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x60000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1b00000000000000, 0x0, 0x0) [ 1088.725906][T11495] loop0: detected capacity change from 0 to 4096 [ 1088.758716][T11502] loop2: detected capacity change from 0 to 4 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xe0ffffff, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000040600040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200fff000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1c00000000000000, 0x0, 0x0) 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xf5ffffff, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1088.895165][T11532] loop0: detected capacity change from 0 to 4096 [ 1088.898016][T11528] FAULT_INJECTION: forcing a failure. [ 1088.898016][T11528] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.914924][T11528] CPU: 0 PID: 11528 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1088.923695][T11528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.933785][T11528] Call Trace: [ 1088.937088][T11528] dump_stack+0x137/0x19d [ 1088.941433][T11528] should_fail+0x23c/0x250 [ 1088.945854][T11528] ? io_req_prep_async+0xdc/0x410 [ 1088.950889][T11528] __should_failslab+0x81/0x90 [ 1088.955707][T11528] should_failslab+0x5/0x20 [ 1088.960307][T11528] __kmalloc+0x66/0x340 [ 1088.964497][T11528] ? io_req_prep_async+0xdc/0x410 [ 1088.969524][T11528] io_req_prep_async+0xdc/0x410 [ 1088.974427][T11528] io_submit_sqe+0x14ca/0x33a0 [ 1088.979289][T11528] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1088.984752][T11528] io_submit_sqes+0x5bd/0xbd0 [ 1088.989484][T11528] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1088.994952][T11528] ? fput+0x2d/0x130 [ 1088.998859][T11528] __x64_sys_io_uring_enter+0x74/0x80 [ 1089.004341][T11528] do_syscall_64+0x4a/0x90 [ 1089.008759][T11528] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.014660][T11528] RIP: 0033:0x4665d9 [ 1089.018553][T11528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfc000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000700040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000007a0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1d00000000000000, 0x0, 0x0) 08:33:44 executing program 5 (fault-call:4 fault-nth:38): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1089.038167][T11528] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1089.046594][T11528] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1089.054588][T11528] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1089.062557][T11528] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1089.065393][T11548] loop2: detected capacity change from 0 to 4 [ 1089.070528][T11528] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1089.070545][T11528] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfe800000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000001100040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1e00000000000000, 0x0, 0x0) 08:33:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20feff000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1089.203954][T11569] FAULT_INJECTION: forcing a failure. [ 1089.203954][T11569] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.216665][T11569] CPU: 0 PID: 11569 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1089.225475][T11569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.235535][T11569] Call Trace: [ 1089.238835][T11569] dump_stack+0x137/0x19d [ 1089.243193][T11569] should_fail+0x23c/0x250 [ 1089.247638][T11569] ? io_req_prep_async+0xdc/0x410 [ 1089.252709][T11569] __should_failslab+0x81/0x90 [ 1089.257506][T11569] should_failslab+0x5/0x20 [ 1089.262021][T11569] __kmalloc+0x66/0x340 [ 1089.266187][T11569] ? io_req_prep_async+0xdc/0x410 [ 1089.271276][T11569] io_req_prep_async+0xdc/0x410 [ 1089.276130][T11569] io_submit_sqe+0x14ca/0x33a0 [ 1089.280916][T11569] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1089.286384][T11569] io_submit_sqes+0x5bd/0xbd0 [ 1089.291078][T11569] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1089.296563][T11569] ? fput+0x2d/0x130 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfe80ffff, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000001800040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1089.300467][T11569] __x64_sys_io_uring_enter+0x74/0x80 [ 1089.305851][T11569] do_syscall_64+0x4a/0x90 [ 1089.310278][T11569] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.316218][T11569] RIP: 0033:0x4665d9 [ 1089.320122][T11569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.339853][T11569] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000001c00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfec0ffff, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000002000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1089.348344][T11569] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1089.356357][T11569] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1089.364437][T11569] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1089.372415][T11569] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1089.380656][T11569] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1089.398522][T11588] loop0: detected capacity change from 0 to 4096 08:33:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000007e0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xff000000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:44 executing program 5 (fault-call:4 fault-nth:39): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x1f00000000000000, 0x0, 0x0) 08:33:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000002600040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xffff0000, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1089.473360][T11612] loop2: detected capacity change from 0 to 4 08:33:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000053300040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x2000000000000000, 0x0, 0x0) 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xffff80fe, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1089.602161][T11639] loop0: detected capacity change from 0 to 4096 [ 1089.610349][T11642] FAULT_INJECTION: forcing a failure. [ 1089.610349][T11642] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.623097][T11642] CPU: 0 PID: 11642 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1089.631868][T11642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.641930][T11642] Call Trace: [ 1089.645239][T11642] dump_stack+0x137/0x19d [ 1089.649696][T11642] should_fail+0x23c/0x250 [ 1089.654114][T11642] ? io_req_prep_async+0xdc/0x410 [ 1089.659192][T11642] __should_failslab+0x81/0x90 [ 1089.663989][T11642] should_failslab+0x5/0x20 [ 1089.668515][T11642] __kmalloc+0x66/0x340 [ 1089.672705][T11642] ? io_req_prep_async+0xdc/0x410 [ 1089.677745][T11642] io_req_prep_async+0xdc/0x410 [ 1089.682593][T11642] io_submit_sqe+0x14ca/0x33a0 [ 1089.687357][T11642] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1089.692837][T11642] io_submit_sqes+0x5bd/0xbd0 [ 1089.697509][T11642] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1089.703044][T11642] ? fput+0x2d/0x130 [ 1089.706957][T11642] __x64_sys_io_uring_enter+0x74/0x80 [ 1089.712427][T11642] do_syscall_64+0x4a/0x90 [ 1089.716913][T11642] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.722814][T11642] RIP: 0033:0x4665d9 [ 1089.726705][T11642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001840000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000003f00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1089.746340][T11642] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1089.754754][T11642] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1089.762720][T11642] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1089.770697][T11642] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1089.778672][T11642] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1089.786684][T11642] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x2100000000000000, 0x0, 0x0) 08:33:45 executing program 5 (fault-call:4 fault-nth:40): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xffffc0fe, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000048000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1089.842506][T11656] loop2: detected capacity change from 0 to 4 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000fdef00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1089.967043][T11683] FAULT_INJECTION: forcing a failure. [ 1089.967043][T11683] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.976552][T11682] loop0: detected capacity change from 0 to 4096 [ 1089.979709][T11683] CPU: 0 PID: 11683 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1089.994748][T11683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.004813][T11683] Call Trace: [ 1090.008126][T11683] dump_stack+0x137/0x19d [ 1090.012516][T11683] should_fail+0x23c/0x250 [ 1090.016956][T11683] ? io_req_prep_async+0xdc/0x410 [ 1090.022010][T11683] __should_failslab+0x81/0x90 [ 1090.026901][T11683] should_failslab+0x5/0x20 [ 1090.031409][T11683] __kmalloc+0x66/0x340 [ 1090.035580][T11683] ? io_req_prep_async+0xdc/0x410 [ 1090.040599][T11683] io_req_prep_async+0xdc/0x410 [ 1090.045448][T11683] io_submit_sqe+0x14ca/0x33a0 [ 1090.050222][T11683] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1090.055710][T11683] io_submit_sqes+0x5bd/0xbd0 [ 1090.060402][T11683] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1090.065918][T11683] ? fput+0x2d/0x130 [ 1090.069808][T11683] __x64_sys_io_uring_enter+0x74/0x80 [ 1090.075180][T11683] do_syscall_64+0x4a/0x90 [ 1090.079598][T11683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.085615][T11683] RIP: 0033:0x4665d9 [ 1090.089508][T11683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.109116][T11683] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000040002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x2200000000000000, 0x0, 0x0) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000effd00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001860000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1090.117530][T11683] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1090.125522][T11683] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1090.133506][T11683] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.141475][T11683] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1090.149441][T11683] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:45 executing program 5 (fault-call:4 fault-nth:41): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xffffff7f, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1090.183088][T11694] loop2: detected capacity change from 0 to 4 08:33:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000080002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000fffe00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1090.306874][T11717] FAULT_INJECTION: forcing a failure. [ 1090.306874][T11717] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.319536][T11717] CPU: 1 PID: 11717 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1090.328316][T11717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.338365][T11717] Call Trace: [ 1090.341641][T11717] dump_stack+0x137/0x19d [ 1090.346009][T11717] should_fail+0x23c/0x250 [ 1090.350432][T11717] ? io_req_prep_async+0xdc/0x410 [ 1090.355494][T11717] __should_failslab+0x81/0x90 [ 1090.360328][T11717] should_failslab+0x5/0x20 [ 1090.364835][T11717] __kmalloc+0x66/0x340 [ 1090.368988][T11717] ? io_req_prep_async+0xdc/0x410 [ 1090.374010][T11717] io_req_prep_async+0xdc/0x410 [ 1090.378943][T11717] io_submit_sqe+0x14ca/0x33a0 [ 1090.383802][T11717] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1090.389266][T11717] io_submit_sqes+0x5bd/0xbd0 [ 1090.393945][T11717] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1090.399427][T11717] ? fput+0x2d/0x130 [ 1090.403321][T11717] __x64_sys_io_uring_enter+0x74/0x80 [ 1090.408704][T11717] do_syscall_64+0x4a/0x90 [ 1090.413131][T11717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.419108][T11717] RIP: 0033:0x4665d9 [ 1090.423082][T11717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.447643][T11717] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xffffffe0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000feff00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0xfffffff5, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000050004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x10}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x2300000000000000, 0x0, 0x0) 08:33:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000100004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1090.456147][T11717] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1090.464151][T11717] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1090.472129][T11717] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.476044][T11719] loop0: detected capacity change from 0 to 4096 [ 1090.480115][T11717] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1090.480134][T11717] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1090.505692][T11722] loop2: detected capacity change from 0 to 4 08:33:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001890000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="204000080002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:45 executing program 5 (fault-call:4 fault-nth:42): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x2400000000000000, 0x0, 0x0) 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000200004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1090.642528][T11765] FAULT_INJECTION: forcing a failure. [ 1090.642528][T11765] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.655209][T11765] CPU: 1 PID: 11765 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1090.663988][T11765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.674070][T11765] Call Trace: [ 1090.677370][T11765] dump_stack+0x137/0x19d [ 1090.681739][T11765] should_fail+0x23c/0x250 [ 1090.686272][T11765] ? io_req_prep_async+0xdc/0x410 [ 1090.691305][T11765] __should_failslab+0x81/0x90 [ 1090.696113][T11765] should_failslab+0x5/0x20 [ 1090.700658][T11765] __kmalloc+0x66/0x340 [ 1090.704879][T11765] ? io_req_prep_async+0xdc/0x410 [ 1090.706913][T11769] loop0: detected capacity change from 0 to 4096 [ 1090.710034][T11765] io_req_prep_async+0xdc/0x410 [ 1090.710058][T11765] io_submit_sqe+0x14ca/0x33a0 [ 1090.725948][T11765] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1090.731431][T11765] io_submit_sqes+0x5bd/0xbd0 [ 1090.736116][T11765] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1090.741605][T11765] ? fput+0x2d/0x130 [ 1090.745504][T11765] __x64_sys_io_uring_enter+0x74/0x80 [ 1090.750881][T11765] do_syscall_64+0x4a/0x90 [ 1090.755297][T11765] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.761199][T11765] RIP: 0033:0x4665d9 [ 1090.765295][T11765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000400004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xeffdffff00000000, 0x0, 0x0) 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffff8c0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1090.785185][T11765] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1090.793607][T11765] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1090.801584][T11765] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1090.809561][T11765] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.817548][T11765] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1090.825540][T11765] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1090.835511][T11768] loop2: detected capacity change from 0 to 4 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000fffffffe0004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:46 executing program 5 (fault-call:4 fault-nth:43): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xf5ffffff00000000, 0x0, 0x0) 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000400002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1090.963086][T11803] FAULT_INJECTION: forcing a failure. [ 1090.963086][T11803] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.975781][T11803] CPU: 1 PID: 11803 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1090.984865][T11803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.994977][T11803] Call Trace: [ 1090.998268][T11803] dump_stack+0x137/0x19d [ 1091.002644][T11803] should_fail+0x23c/0x250 [ 1091.007223][T11803] ? io_req_prep_async+0xdc/0x410 [ 1091.012331][T11803] __should_failslab+0x81/0x90 [ 1091.017102][T11803] should_failslab+0x5/0x20 [ 1091.021799][T11803] __kmalloc+0x66/0x340 [ 1091.025964][T11803] ? io_req_prep_async+0xdc/0x410 [ 1091.031008][T11803] io_req_prep_async+0xdc/0x410 [ 1091.035904][T11803] io_submit_sqe+0x14ca/0x33a0 [ 1091.040688][T11803] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1091.046237][T11803] io_submit_sqes+0x5bd/0xbd0 [ 1091.050925][T11803] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1091.056402][T11803] ? fput+0x2d/0x130 [ 1091.060480][T11803] __x64_sys_io_uring_enter+0x74/0x80 [ 1091.065874][T11803] do_syscall_64+0x4a/0x90 [ 1091.070307][T11803] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.076221][T11803] RIP: 0033:0x4665d9 [ 1091.080175][T11803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.100025][T11803] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0xfa720c71f2000000, 0x0, 0x0) 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000880000004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x5}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1091.108449][T11803] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1091.116549][T11803] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1091.121273][T11808] loop0: detected capacity change from 0 to 4096 [ 1091.124560][T11803] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.124579][T11803] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1091.124592][T11803] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001b00000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000200040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2) 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1091.169876][T11815] loop2: detected capacity change from 0 to 4 08:33:46 executing program 5 (fault-call:4 fault-nth:44): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x3) 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x7}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000300040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1091.313379][T11856] loop0: detected capacity change from 0 to 4096 08:33:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001b10000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x4) [ 1091.360770][T11861] loop2: detected capacity change from 0 to 4 [ 1091.381684][T11867] FAULT_INJECTION: forcing a failure. [ 1091.381684][T11867] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.394481][T11867] CPU: 1 PID: 11867 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x8}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1091.403255][T11867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.413310][T11867] Call Trace: [ 1091.416590][T11867] dump_stack+0x137/0x19d [ 1091.420931][T11867] should_fail+0x23c/0x250 [ 1091.425360][T11867] __should_failslab+0x81/0x90 [ 1091.430136][T11867] should_failslab+0x5/0x20 [ 1091.434658][T11867] kmem_cache_alloc_bulk+0x40/0x340 [ 1091.439878][T11867] io_submit_sqes+0x4a3/0xbd0 [ 1091.444557][T11867] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1091.450122][T11867] ? fput+0x2d/0x130 [ 1091.454070][T11867] __x64_sys_io_uring_enter+0x74/0x80 [ 1091.459490][T11867] do_syscall_64+0x4a/0x90 [ 1091.463912][T11867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.469821][T11867] RIP: 0033:0x4665d9 [ 1091.473759][T11867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.493375][T11867] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1091.501808][T11867] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 08:33:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xf}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000400040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:46 executing program 5 (fault-call:4 fault-nth:45): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x5) [ 1091.509782][T11867] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1091.517823][T11867] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.525800][T11867] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1091.533871][T11867] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1091.648045][T11900] loop0: detected capacity change from 0 to 4096 [ 1091.665643][T11906] FAULT_INJECTION: forcing a failure. [ 1091.665643][T11906] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.678359][T11906] CPU: 0 PID: 11906 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1091.688082][T11906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000500040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1091.698246][T11906] Call Trace: [ 1091.701526][T11906] dump_stack+0x137/0x19d [ 1091.705873][T11906] should_fail+0x23c/0x250 [ 1091.710296][T11906] ? io_req_prep_async+0xdc/0x410 [ 1091.715353][T11906] __should_failslab+0x81/0x90 [ 1091.720129][T11906] should_failslab+0x5/0x20 [ 1091.724734][T11906] __kmalloc+0x66/0x340 [ 1091.728961][T11906] ? io_req_prep_async+0xdc/0x410 [ 1091.733991][T11906] io_req_prep_async+0xdc/0x410 [ 1091.738857][T11906] io_submit_sqe+0x14ca/0x33a0 08:33:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x6) [ 1091.743708][T11906] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1091.749173][T11906] io_submit_sqes+0x5bd/0xbd0 [ 1091.753863][T11906] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1091.759300][T11913] loop2: detected capacity change from 0 to 4 [ 1091.759395][T11906] ? fput+0x2d/0x130 [ 1091.769370][T11906] __x64_sys_io_uring_enter+0x74/0x80 [ 1091.774780][T11906] do_syscall_64+0x4a/0x90 [ 1091.779199][T11906] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.785178][T11906] RIP: 0033:0x4665d9 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x11}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1091.789080][T11906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.808911][T11906] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1091.817432][T11906] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1091.825403][T11906] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1091.833394][T11906] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001b80000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000600040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 5 (fault-call:4 fault-nth:46): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x7) 08:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000040202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1091.841483][T11906] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1091.849521][T11906] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x28}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x8) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000700040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000800040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1091.955724][T11944] loop2: detected capacity change from 0 to 4 [ 1091.966890][T11946] loop0: detected capacity change from 0 to 4096 [ 1091.991653][T11952] FAULT_INJECTION: forcing a failure. [ 1091.991653][T11952] name failslab, interval 1, probability 0, space 0, times 0 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000001100040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000001800040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1092.004337][T11952] CPU: 1 PID: 11952 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1092.013217][T11952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.023320][T11952] Call Trace: [ 1092.026648][T11952] dump_stack+0x137/0x19d [ 1092.030983][T11952] should_fail+0x23c/0x250 [ 1092.035418][T11952] ? io_req_prep_async+0xdc/0x410 [ 1092.040441][T11952] __should_failslab+0x81/0x90 [ 1092.045210][T11952] should_failslab+0x5/0x20 [ 1092.049721][T11952] __kmalloc+0x66/0x340 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000001c00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1092.053880][T11952] ? io_req_prep_async+0xdc/0x410 [ 1092.059010][T11952] io_req_prep_async+0xdc/0x410 [ 1092.063895][T11952] io_submit_sqe+0x14ca/0x33a0 [ 1092.068662][T11952] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1092.074158][T11952] io_submit_sqes+0x5bd/0xbd0 [ 1092.078880][T11952] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1092.084349][T11952] ? fput+0x2d/0x130 [ 1092.088421][T11952] __x64_sys_io_uring_enter+0x74/0x80 [ 1092.093817][T11952] do_syscall_64+0x4a/0x90 [ 1092.098279][T11952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.104247][T11952] RIP: 0033:0x4665d9 [ 1092.108133][T11952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.127857][T11952] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1092.136263][T11952] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1092.144230][T11952] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001b90000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000002600040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x60}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:47 executing program 5 (fault-call:4 fault-nth:47): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1092.152215][T11952] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.160255][T11952] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1092.168207][T11952] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x9) 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xfc}}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000fe00040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1092.302360][T11985] loop2: detected capacity change from 0 to 4 [ 1092.320910][T11992] FAULT_INJECTION: forcing a failure. [ 1092.320910][T11992] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.333629][T11992] CPU: 0 PID: 11992 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000402040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1092.342403][T11992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.355147][T11992] Call Trace: [ 1092.358477][T11992] dump_stack+0x137/0x19d [ 1092.362810][T11992] should_fail+0x23c/0x250 [ 1092.367230][T11992] ? io_req_prep_async+0xdc/0x410 [ 1092.371544][T11996] loop0: detected capacity change from 0 to 4096 [ 1092.372261][T11992] __should_failslab+0x81/0x90 [ 1092.383446][T11992] should_failslab+0x5/0x20 [ 1092.388001][T11992] __kmalloc+0x66/0x340 [ 1092.392193][T11992] ? io_req_prep_async+0xdc/0x410 [ 1092.397223][T11992] io_req_prep_async+0xdc/0x410 08:33:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xa) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000003040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1092.402071][T11992] io_submit_sqe+0x14ca/0x33a0 [ 1092.406930][T11992] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1092.412403][T11992] io_submit_sqes+0x5bd/0xbd0 [ 1092.417098][T11992] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1092.422635][T11992] ? fput+0x2d/0x130 [ 1092.426569][T11992] __x64_sys_io_uring_enter+0x74/0x80 [ 1092.432092][T11992] do_syscall_64+0x4a/0x90 [ 1092.436581][T11992] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.442497][T11992] RIP: 0033:0x4665d9 [ 1092.446483][T11992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.466878][T11992] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1092.475296][T11992] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1092.483273][T11992] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1092.491257][T11992] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000204040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:47 executing program 5 (fault-call:4 fault-nth:48): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001ba0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1092.499258][T11992] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1092.507241][T11992] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xb) 08:33:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1092.626857][T12039] FAULT_INJECTION: forcing a failure. [ 1092.626857][T12039] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.639561][T12039] CPU: 0 PID: 12039 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1092.648460][T12039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.658604][T12039] Call Trace: [ 1092.661886][T12039] dump_stack+0x137/0x19d [ 1092.666246][T12039] should_fail+0x23c/0x250 [ 1092.670709][T12039] ? io_req_prep_async+0xdc/0x410 [ 1092.675771][T12039] __should_failslab+0x81/0x90 [ 1092.678106][T12047] loop0: detected capacity change from 0 to 4096 [ 1092.680603][T12039] should_failslab+0x5/0x20 [ 1092.680635][T12039] __kmalloc+0x66/0x340 [ 1092.694413][T12040] loop2: detected capacity change from 0 to 4 [ 1092.695623][T12039] ? io_req_prep_async+0xdc/0x410 [ 1092.695649][T12039] io_req_prep_async+0xdc/0x410 [ 1092.695671][T12039] io_submit_sqe+0x14ca/0x33a0 [ 1092.695688][T12039] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1092.695709][T12039] io_submit_sqes+0x5bd/0xbd0 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000604040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1092.726567][T12039] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1092.732076][T12039] ? fput+0x2d/0x130 [ 1092.735990][T12039] __x64_sys_io_uring_enter+0x74/0x80 [ 1092.741376][T12039] do_syscall_64+0x4a/0x90 [ 1092.745806][T12039] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.751815][T12039] RIP: 0033:0x4665d9 [ 1092.755713][T12039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xc) [ 1092.775365][T12039] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1092.783790][T12039] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1092.791876][T12039] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1092.799876][T12039] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.807852][T12039] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1092.815853][T12039] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 5 (fault-call:4 fault-nth:49): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001bb0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1092.923277][T12077] FAULT_INJECTION: forcing a failure. [ 1092.923277][T12077] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.935984][T12077] CPU: 1 PID: 12077 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1092.944767][T12077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.954923][T12077] Call Trace: [ 1092.958203][T12077] dump_stack+0x137/0x19d [ 1092.962545][T12077] should_fail+0x23c/0x250 [ 1092.966988][T12077] ? io_req_prep_async+0xdc/0x410 [ 1092.972089][T12077] __should_failslab+0x81/0x90 [ 1092.976975][T12077] should_failslab+0x5/0x20 [ 1092.981583][T12077] __kmalloc+0x66/0x340 [ 1092.985755][T12077] ? io_req_prep_async+0xdc/0x410 [ 1092.990809][T12077] io_req_prep_async+0xdc/0x410 [ 1092.995680][T12077] io_submit_sqe+0x14ca/0x33a0 [ 1093.000459][T12077] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1093.005937][T12077] io_submit_sqes+0x5bd/0xbd0 [ 1093.010674][T12077] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1093.016177][T12077] ? fput+0x2d/0x130 [ 1093.020130][T12077] __x64_sys_io_uring_enter+0x74/0x80 [ 1093.025522][T12077] do_syscall_64+0x4a/0x90 [ 1093.029967][T12077] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1093.035880][T12077] RIP: 0033:0x4665d9 [ 1093.039784][T12077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.059451][T12077] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000008004040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000005040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000003305040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000006040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000406040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000007040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xd) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000011040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1093.068119][T12077] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1093.076101][T12077] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1093.084101][T12077] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.092163][T12077] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1093.100159][T12077] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1093.108286][T12073] loop2: detected capacity change from 0 to 4 08:33:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1093.180547][T12109] loop0: detected capacity change from 0 to 4096 08:33:48 executing program 5 (fault-call:4 fault-nth:50): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000018040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001c00000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xe) [ 1093.232482][T12109] EXT4-fs mount: 18 callbacks suppressed [ 1093.232495][T12109] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1093.300898][T12129] loop2: detected capacity change from 0 to 4 [ 1093.362843][T12143] FAULT_INJECTION: forcing a failure. [ 1093.362843][T12143] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.375505][T12143] CPU: 1 PID: 12143 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1093.384343][T12143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.395129][T12143] Call Trace: [ 1093.398480][T12143] dump_stack+0x137/0x19d [ 1093.402853][T12143] should_fail+0x23c/0x250 [ 1093.407308][T12143] ? io_req_prep_async+0xdc/0x410 [ 1093.412368][T12143] __should_failslab+0x81/0x90 [ 1093.417220][T12143] should_failslab+0x5/0x20 [ 1093.421809][T12143] __kmalloc+0x66/0x340 [ 1093.425977][T12143] ? io_req_prep_async+0xdc/0x410 [ 1093.431054][T12143] io_req_prep_async+0xdc/0x410 [ 1093.436000][T12143] io_submit_sqe+0x14ca/0x33a0 [ 1093.440770][T12143] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1093.446263][T12143] io_submit_sqes+0x5bd/0xbd0 [ 1093.450952][T12143] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1093.456520][T12143] ? fput+0x2d/0x130 [ 1093.460419][T12143] __x64_sys_io_uring_enter+0x74/0x80 [ 1093.465854][T12143] do_syscall_64+0x4a/0x90 [ 1093.470284][T12143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1093.476186][T12143] RIP: 0033:0x4665d9 [ 1093.480181][T12143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.499789][T12143] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000040602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000001c040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf) 08:33:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000020040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1093.508214][T12143] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1093.516196][T12143] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1093.524190][T12143] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.532186][T12143] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1093.540162][T12143] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x10) [ 1093.564068][T12159] loop2: detected capacity change from 0 to 4 [ 1093.565853][T12140] loop0: detected capacity change from 0 to 4096 08:33:49 executing program 5 (fault-call:4 fault-nth:51): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000edc00000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xf}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000026040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1093.604480][T12140] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000533040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1093.712504][T12193] loop0: detected capacity change from 0 to 4096 [ 1093.758908][T12193] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1093.771620][T12201] FAULT_INJECTION: forcing a failure. [ 1093.771620][T12201] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.772480][T12202] loop2: detected capacity change from 0 to 4 [ 1093.784270][T12201] CPU: 1 PID: 12201 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1093.799149][T12201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:33:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x11) 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x10}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1093.809220][T12201] Call Trace: [ 1093.812500][T12201] dump_stack+0x137/0x19d [ 1093.816866][T12201] should_fail+0x23c/0x250 [ 1093.821282][T12201] ? io_req_prep_async+0xdc/0x410 [ 1093.826335][T12201] __should_failslab+0x81/0x90 [ 1093.831106][T12201] should_failslab+0x5/0x20 [ 1093.835615][T12201] __kmalloc+0x66/0x340 [ 1093.839779][T12201] ? io_req_prep_async+0xdc/0x410 [ 1093.844869][T12201] io_req_prep_async+0xdc/0x410 [ 1093.849804][T12201] io_submit_sqe+0x14ca/0x33a0 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000003f040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x12) 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x11}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1093.854573][T12201] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1093.860049][T12201] io_submit_sqes+0x5bd/0xbd0 [ 1093.864808][T12201] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1093.870287][T12201] ? fput+0x2d/0x130 [ 1093.874210][T12201] __x64_sys_io_uring_enter+0x74/0x80 [ 1093.879623][T12201] do_syscall_64+0x4a/0x90 [ 1093.884101][T12201] ? irqentry_exit_to_user_mode+0x5/0x20 [ 1093.889736][T12201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1093.895635][T12201] RIP: 0033:0x4665d9 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000480040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1093.899530][T12201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.919142][T12201] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1093.927561][T12201] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1093.935554][T12201] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1093.943530][T12201] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.951503][T12201] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:33:49 executing program 5 (fault-call:4 fault-nth:52): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001c10000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000fdef040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1093.959491][T12201] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x28}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000effd040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1094.032144][T12234] FAULT_INJECTION: forcing a failure. [ 1094.032144][T12234] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.044800][T12234] CPU: 0 PID: 12234 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1094.053699][T12234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.064157][T12234] Call Trace: [ 1094.067435][T12234] dump_stack+0x137/0x19d [ 1094.071775][T12234] should_fail+0x23c/0x250 [ 1094.076198][T12234] ? io_req_prep_async+0xdc/0x410 [ 1094.081240][T12234] __should_failslab+0x81/0x90 [ 1094.086043][T12234] should_failslab+0x5/0x20 [ 1094.090564][T12234] __kmalloc+0x66/0x340 [ 1094.094734][T12234] ? io_req_prep_async+0xdc/0x410 [ 1094.099790][T12234] io_req_prep_async+0xdc/0x410 [ 1094.105528][T12234] io_submit_sqe+0x14ca/0x33a0 [ 1094.110412][T12234] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1094.115889][T12234] io_submit_sqes+0x5bd/0xbd0 [ 1094.120574][T12234] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1094.126114][T12234] ? fput+0x2d/0x130 [ 1094.130029][T12234] __x64_sys_io_uring_enter+0x74/0x80 [ 1094.135441][T12234] do_syscall_64+0x4a/0x90 [ 1094.139864][T12234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.140833][T12248] loop0: detected capacity change from 0 to 4096 [ 1094.145834][T12234] RIP: 0033:0x4665d9 [ 1094.145854][T12234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.145873][T12234] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1094.145892][T12234] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1094.192143][T12234] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1094.200114][T12234] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.210172][T12234] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1094.218185][T12234] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x60}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000003c10000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000fffe040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1094.227618][T12248] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x13) 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfc}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:49 executing program 5 (fault-call:4 fault-nth:53): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1094.276925][T12258] loop2: detected capacity change from 0 to 4 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000feff040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x300}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1094.394595][T12274] loop0: detected capacity change from 0 to 4096 [ 1094.432396][T12274] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x14) [ 1094.438625][T12290] FAULT_INJECTION: forcing a failure. [ 1094.438625][T12290] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.456018][T12290] CPU: 0 PID: 12290 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1094.464785][T12290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.474840][T12290] Call Trace: [ 1094.478117][T12290] dump_stack+0x137/0x19d [ 1094.482530][T12290] should_fail+0x23c/0x250 [ 1094.487021][T12290] __should_failslab+0x81/0x90 08:33:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000015d10000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1094.491842][T12290] should_failslab+0x5/0x20 [ 1094.496353][T12290] kmem_cache_alloc_bulk+0x40/0x340 [ 1094.501559][T12290] io_submit_sqes+0x4a3/0xbd0 [ 1094.506240][T12290] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1094.511776][T12290] ? fput+0x2d/0x130 [ 1094.515725][T12290] __x64_sys_io_uring_enter+0x74/0x80 [ 1094.521110][T12290] do_syscall_64+0x4a/0x90 [ 1094.525546][T12290] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.531458][T12290] RIP: 0033:0x4665d9 08:33:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000100004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1094.535376][T12290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.555096][T12290] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1094.563540][T12290] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1094.571516][T12290] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1094.577448][T12298] loop2: detected capacity change from 0 to 4 [ 1094.579486][T12290] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x500}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x15) 08:33:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000020902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000030004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1094.579503][T12290] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1094.601645][T12290] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x600}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 5 (fault-call:4 fault-nth:54): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x700}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000002040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1094.700707][T12327] loop0: detected capacity change from 0 to 4096 [ 1094.723959][T12327] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x16) 08:33:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001d20000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1094.764011][T12334] loop2: detected capacity change from 0 to 4 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x810}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x17) [ 1094.833623][T12352] FAULT_INJECTION: forcing a failure. [ 1094.833623][T12352] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.846383][T12352] CPU: 1 PID: 12352 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1094.855148][T12352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.865206][T12352] Call Trace: [ 1094.868498][T12352] dump_stack+0x137/0x19d [ 1094.872883][T12352] should_fail+0x23c/0x250 [ 1094.877380][T12352] ? io_req_prep_async+0xdc/0x410 08:33:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000003040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1094.882412][T12352] __should_failslab+0x81/0x90 [ 1094.887285][T12352] should_failslab+0x5/0x20 [ 1094.891797][T12352] __kmalloc+0x66/0x340 [ 1094.895955][T12352] ? io_req_prep_async+0xdc/0x410 [ 1094.900979][T12352] io_req_prep_async+0xdc/0x410 [ 1094.905834][T12352] io_submit_sqe+0x14ca/0x33a0 [ 1094.910654][T12352] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1094.916151][T12352] io_submit_sqes+0x5bd/0xbd0 [ 1094.920835][T12352] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1094.926476][T12352] ? fput+0x2d/0x130 08:33:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1094.930375][T12352] __x64_sys_io_uring_enter+0x74/0x80 [ 1094.935788][T12352] do_syscall_64+0x4a/0x90 [ 1094.940211][T12352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.946115][T12352] RIP: 0033:0x4665d9 [ 1094.950030][T12352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.969707][T12352] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xf00}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x18) [ 1094.978140][T12352] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1094.986118][T12352] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1094.994095][T12352] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1095.002073][T12352] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1095.010041][T12352] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000004040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1095.033112][T12377] loop2: detected capacity change from 0 to 4 [ 1095.056349][T12368] loop0: detected capacity change from 0 to 4096 08:33:50 executing program 5 (fault-call:4 fault-nth:55): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000b02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x1008}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x19) [ 1095.100887][T12368] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001d30000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1095.211164][T12417] FAULT_INJECTION: forcing a failure. [ 1095.211164][T12417] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.223876][T12417] CPU: 1 PID: 12417 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1095.229668][T12412] loop2: detected capacity change from 0 to 4 [ 1095.232703][T12417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.232720][T12417] Call Trace: [ 1095.232729][T12417] dump_stack+0x137/0x19d [ 1095.256565][T12417] should_fail+0x23c/0x250 [ 1095.261096][T12417] ? io_req_prep_async+0xdc/0x410 [ 1095.266124][T12417] __should_failslab+0x81/0x90 [ 1095.270956][T12417] should_failslab+0x5/0x20 [ 1095.275494][T12417] __kmalloc+0x66/0x340 [ 1095.279692][T12417] ? io_req_prep_async+0xdc/0x410 [ 1095.284731][T12417] io_req_prep_async+0xdc/0x410 [ 1095.289618][T12417] io_submit_sqe+0x14ca/0x33a0 [ 1095.294460][T12417] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1095.300011][T12417] io_submit_sqes+0x5bd/0xbd0 [ 1095.304716][T12417] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1095.310325][T12417] ? fput+0x2d/0x130 [ 1095.314389][T12417] __x64_sys_io_uring_enter+0x74/0x80 [ 1095.319770][T12417] do_syscall_64+0x4a/0x90 [ 1095.324251][T12417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.330151][T12417] RIP: 0033:0x4665d9 [ 1095.334045][T12417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x1100}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000005040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:50 executing program 5 (fault-call:4 fault-nth:56): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1095.353655][T12417] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1095.362080][T12417] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1095.370179][T12417] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1095.378171][T12417] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1095.386153][T12417] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1095.394131][T12417] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1095.462810][T12432] FAULT_INJECTION: forcing a failure. [ 1095.462810][T12432] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.475296][T12435] loop0: detected capacity change from 0 to 4096 [ 1095.475609][T12432] CPU: 1 PID: 12432 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1095.490630][T12432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.500715][T12432] Call Trace: [ 1095.504040][T12432] dump_stack+0x137/0x19d [ 1095.508412][T12432] should_fail+0x23c/0x250 [ 1095.512831][T12432] ? io_req_prep_async+0xdc/0x410 [ 1095.517862][T12432] __should_failslab+0x81/0x90 [ 1095.522666][T12432] should_failslab+0x5/0x20 [ 1095.527298][T12432] __kmalloc+0x66/0x340 [ 1095.531511][T12432] ? io_req_prep_async+0xdc/0x410 [ 1095.536533][T12432] io_req_prep_async+0xdc/0x410 [ 1095.541433][T12432] io_submit_sqe+0x14ca/0x33a0 [ 1095.546194][T12432] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1095.551673][T12432] io_submit_sqes+0x5bd/0xbd0 [ 1095.556348][T12432] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1095.561920][T12432] ? fput+0x2d/0x130 [ 1095.565814][T12432] __x64_sys_io_uring_enter+0x74/0x80 [ 1095.571273][T12432] do_syscall_64+0x4a/0x90 [ 1095.575688][T12432] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.581584][T12432] RIP: 0033:0x4665d9 [ 1095.585555][T12432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1a) 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000006040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1b) [ 1095.605455][T12432] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1095.613896][T12432] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1095.621886][T12432] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1095.629863][T12432] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1095.637835][T12432] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1095.645805][T12432] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2800}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3f00}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 5 (fault-call:4 fault-nth:57): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000007040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001d60000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1095.696917][T12435] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1c) [ 1095.815116][T12473] loop0: detected capacity change from 0 to 4096 [ 1095.815313][T12472] FAULT_INJECTION: forcing a failure. [ 1095.815313][T12472] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.834311][T12472] CPU: 1 PID: 12472 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1095.843112][T12472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.853230][T12472] Call Trace: [ 1095.856510][T12472] dump_stack+0x137/0x19d [ 1095.860847][T12472] should_fail+0x23c/0x250 [ 1095.865285][T12472] ? io_req_prep_async+0xdc/0x410 [ 1095.870323][T12472] __should_failslab+0x81/0x90 [ 1095.875094][T12472] should_failslab+0x5/0x20 [ 1095.879710][T12472] __kmalloc+0x66/0x340 [ 1095.883889][T12472] ? io_req_prep_async+0xdc/0x410 [ 1095.888978][T12472] io_req_prep_async+0xdc/0x410 [ 1095.893873][T12472] io_submit_sqe+0x14ca/0x33a0 [ 1095.898652][T12472] io_submit_sqes+0x5bd/0xbd0 [ 1095.903330][T12472] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1095.908906][T12472] ? fput+0x2d/0x130 [ 1095.912879][T12472] __x64_sys_io_uring_enter+0x74/0x80 [ 1095.918266][T12472] do_syscall_64+0x4a/0x90 [ 1095.922691][T12472] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.928588][T12472] RIP: 0033:0x4665d9 [ 1095.932509][T12472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1095.952136][T12472] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000008040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1d) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1095.960559][T12472] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1095.968533][T12472] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1095.976508][T12472] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1095.984482][T12472] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1095.992474][T12472] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000011040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 5 (fault-call:4 fault-nth:58): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000d02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1096.024128][T12478] loop2: detected capacity change from 0 to 4 [ 1096.054970][T12473] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001d80000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x80fe}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000018040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1096.113109][T12504] FAULT_INJECTION: forcing a failure. [ 1096.113109][T12504] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.125784][T12504] CPU: 0 PID: 12504 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1096.134561][T12504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.144619][T12504] Call Trace: [ 1096.147902][T12504] dump_stack+0x137/0x19d [ 1096.152244][T12504] should_fail+0x23c/0x250 [ 1096.156667][T12504] ? io_req_prep_async+0xdc/0x410 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfc00}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1096.161691][T12504] __should_failslab+0x81/0x90 [ 1096.166465][T12504] should_failslab+0x5/0x20 [ 1096.170981][T12504] __kmalloc+0x66/0x340 [ 1096.175143][T12504] ? io_req_prep_async+0xdc/0x410 [ 1096.180195][T12504] io_req_prep_async+0xdc/0x410 [ 1096.185052][T12504] io_submit_sqe+0x14ca/0x33a0 [ 1096.189828][T12504] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1096.195297][T12504] io_submit_sqes+0x5bd/0xbd0 [ 1096.200109][T12504] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1096.205619][T12504] ? fput+0x2d/0x130 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1e) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfe80}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1096.209531][T12504] __x64_sys_io_uring_enter+0x74/0x80 [ 1096.215019][T12504] do_syscall_64+0x4a/0x90 [ 1096.219454][T12504] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.225393][T12504] RIP: 0033:0x4665d9 [ 1096.229312][T12504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.248957][T12504] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000001c040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xff00}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x21) [ 1096.257408][T12504] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1096.265392][T12504] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1096.273373][T12504] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1096.281437][T12504] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1096.286951][T12510] loop2: detected capacity change from 0 to 4 [ 1096.289557][T12504] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 5 (fault-call:4 fault-nth:59): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x34000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1096.382907][T12550] loop0: detected capacity change from 0 to 4096 08:33:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001d90000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000026040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x40000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x22) [ 1096.424791][T12550] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1096.443370][T12566] loop2: detected capacity change from 0 to 4 [ 1096.450218][T12565] FAULT_INJECTION: forcing a failure. [ 1096.450218][T12565] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.462961][T12565] CPU: 0 PID: 12565 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 08:33:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x50000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000000000fe040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1096.471745][T12565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.481869][T12565] Call Trace: [ 1096.485210][T12565] dump_stack+0x137/0x19d [ 1096.489614][T12565] should_fail+0x23c/0x250 [ 1096.494084][T12565] ? io_req_prep_async+0xdc/0x410 [ 1096.499117][T12565] __should_failslab+0x81/0x90 [ 1096.503901][T12565] should_failslab+0x5/0x20 [ 1096.508451][T12565] __kmalloc+0x66/0x340 [ 1096.512669][T12565] ? io_req_prep_async+0xdc/0x410 [ 1096.517770][T12565] io_req_prep_async+0xdc/0x410 08:33:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x23) 08:33:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000050004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1096.522627][T12565] io_submit_sqe+0x14ca/0x33a0 [ 1096.527393][T12565] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1096.532967][T12565] io_submit_sqes+0x5bd/0xbd0 [ 1096.537713][T12565] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1096.543193][T12565] ? fput+0x2d/0x130 [ 1096.547087][T12565] __x64_sys_io_uring_enter+0x74/0x80 [ 1096.552843][T12565] do_syscall_64+0x4a/0x90 [ 1096.557268][T12565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.563185][T12565] RIP: 0033:0x4665d9 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000200004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1096.567078][T12565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.586834][T12565] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1096.595255][T12565] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1096.603236][T12565] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1096.611217][T12565] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000400004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 5 (fault-call:4 fault-nth:60): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1096.619218][T12565] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1096.627349][T12565] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1096.676354][T12604] loop0: detected capacity change from 0 to 4096 [ 1096.699923][T12604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1096.711796][T12613] loop2: detected capacity change from 0 to 4 [ 1096.724006][T12617] FAULT_INJECTION: forcing a failure. [ 1096.724006][T12617] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.736674][T12617] CPU: 1 PID: 12617 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1096.745516][T12617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.755634][T12617] Call Trace: [ 1096.759237][T12617] dump_stack+0x137/0x19d [ 1096.763621][T12617] should_fail+0x23c/0x250 [ 1096.768043][T12617] ? io_req_prep_async+0xdc/0x410 [ 1096.773057][T12617] __should_failslab+0x81/0x90 [ 1096.777923][T12617] should_failslab+0x5/0x20 [ 1096.782454][T12617] __kmalloc+0x66/0x340 [ 1096.786602][T12617] ? io_req_prep_async+0xdc/0x410 [ 1096.791635][T12617] io_req_prep_async+0xdc/0x410 [ 1096.796555][T12617] io_submit_sqe+0x14ca/0x33a0 [ 1096.801303][T12617] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1096.806762][T12617] io_submit_sqes+0x5bd/0xbd0 [ 1096.811436][T12617] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1096.816951][T12617] ? fput+0x2d/0x130 [ 1096.821660][T12617] __x64_sys_io_uring_enter+0x74/0x80 [ 1096.827023][T12617] do_syscall_64+0x4a/0x90 [ 1096.831436][T12617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.837682][T12617] RIP: 0033:0x4665d9 [ 1096.841573][T12617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.861303][T12617] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffffda0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x24) 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000000000fffe0004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x100000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:52 executing program 5 (fault-call:4 fault-nth:61): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000001002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1096.869743][T12617] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1096.879071][T12617] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1096.887281][T12617] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1096.895295][T12617] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1096.903261][T12617] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1096.984684][T12632] FAULT_INJECTION: forcing a failure. [ 1096.984684][T12632] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.997424][T12632] CPU: 1 PID: 12632 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1097.006218][T12632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.016294][T12632] Call Trace: [ 1097.019579][T12632] dump_stack+0x137/0x19d [ 1097.023912][T12632] should_fail+0x23c/0x250 [ 1097.028375][T12632] ? io_req_prep_async+0xdc/0x410 08:33:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400300}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000020004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x300) 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000030004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1097.033466][T12632] __should_failslab+0x81/0x90 [ 1097.038293][T12632] should_failslab+0x5/0x20 [ 1097.042836][T12632] __kmalloc+0x66/0x340 [ 1097.047054][T12632] ? io_req_prep_async+0xdc/0x410 [ 1097.052115][T12632] io_req_prep_async+0xdc/0x410 [ 1097.057176][T12632] io_submit_sqe+0x14ca/0x33a0 [ 1097.062034][T12632] io_submit_sqes+0x5bd/0xbd0 [ 1097.066744][T12632] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1097.072221][T12632] ? fput+0x2d/0x130 [ 1097.076116][T12632] __x64_sys_io_uring_enter+0x74/0x80 [ 1097.081492][T12632] do_syscall_64+0x4a/0x90 [ 1097.085661][T12635] loop2: detected capacity change from 0 to 4 [ 1097.085931][T12632] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.097976][T12632] RIP: 0033:0x4665d9 [ 1097.101874][T12632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.121502][T12632] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000050004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 5 (fault-call:4 fault-nth:62): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1097.129928][T12632] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1097.137903][T12632] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1097.145893][T12632] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1097.155695][T12632] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1097.163973][T12632] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1097.208620][T12653] loop0: detected capacity change from 0 to 4096 [ 1097.241346][T12660] FAULT_INJECTION: forcing a failure. [ 1097.241346][T12660] name failslab, interval 1, probability 0, space 0, times 0 08:33:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffffe20000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x1000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x500) 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000100004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1097.254089][T12660] CPU: 1 PID: 12660 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1097.256973][T12653] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1097.262876][T12660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.262893][T12660] Call Trace: [ 1097.262901][T12660] dump_stack+0x137/0x19d [ 1097.262927][T12660] should_fail+0x23c/0x250 [ 1097.262948][T12660] __should_failslab+0x81/0x90 [ 1097.262970][T12660] should_failslab+0x5/0x20 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000fe0004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1097.305535][T12660] kmem_cache_alloc_bulk+0x40/0x340 [ 1097.310779][T12660] io_submit_sqes+0x4a3/0xbd0 [ 1097.315462][T12660] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1097.320943][T12660] ? fput+0x2d/0x130 [ 1097.324941][T12660] __x64_sys_io_uring_enter+0x74/0x80 [ 1097.330419][T12660] do_syscall_64+0x4a/0x90 [ 1097.334848][T12660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.340761][T12660] RIP: 0033:0x4665d9 [ 1097.344656][T12660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.364281][T12660] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1097.372824][T12660] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1097.380813][T12660] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1097.388796][T12660] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1097.396787][T12660] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:33:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000041002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x600) 08:33:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000feff04", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:52 executing program 5 (fault-call:4 fault-nth:63): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1097.404773][T12660] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1097.490499][T12697] loop0: detected capacity change from 0 to 4096 [ 1097.498173][T12699] loop2: detected capacity change from 0 to 4 [ 1097.499892][T12704] FAULT_INJECTION: forcing a failure. [ 1097.499892][T12704] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.519630][T12704] CPU: 1 PID: 12704 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1097.528401][T12704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.538460][T12704] Call Trace: [ 1097.541739][T12704] dump_stack+0x137/0x19d [ 1097.546075][T12704] should_fail+0x23c/0x250 [ 1097.550542][T12704] ? io_req_prep_async+0xdc/0x410 [ 1097.555580][T12704] __should_failslab+0x81/0x90 [ 1097.560441][T12704] should_failslab+0x5/0x20 [ 1097.564996][T12704] __kmalloc+0x66/0x340 [ 1097.569175][T12704] ? io_req_prep_async+0xdc/0x410 [ 1097.574267][T12704] io_req_prep_async+0xdc/0x410 [ 1097.579142][T12704] io_submit_sqe+0x14ca/0x33a0 [ 1097.583922][T12704] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1097.589439][T12704] io_submit_sqes+0x5bd/0xbd0 [ 1097.594130][T12704] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1097.599687][T12704] ? fput+0x2d/0x130 [ 1097.603673][T12704] __x64_sys_io_uring_enter+0x74/0x80 [ 1097.609072][T12704] do_syscall_64+0x4a/0x90 [ 1097.613528][T12704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.619454][T12704] RIP: 0033:0x4665d9 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040003", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1097.623352][T12704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.642972][T12704] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1097.651411][T12704] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1097.659397][T12704] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1097.667406][T12704] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1097.675403][T12704] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1097.683384][T12704] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001ee0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x700) 08:33:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000001102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1097.701907][T12697] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040204", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x900) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 5 (fault-call:4 fault-nth:64): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040304", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x5000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xa00) [ 1097.797762][T12729] loop2: detected capacity change from 0 to 4 [ 1097.828810][T12735] loop0: detected capacity change from 0 to 4096 [ 1097.891369][T12735] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1097.904140][T12755] FAULT_INJECTION: forcing a failure. [ 1097.904140][T12755] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.916811][T12755] CPU: 0 PID: 12755 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1097.925947][T12755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.936102][T12755] Call Trace: 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040404", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000001ef0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000021102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1097.939390][T12755] dump_stack+0x137/0x19d [ 1097.943793][T12755] should_fail+0x23c/0x250 [ 1097.948306][T12755] ? io_req_prep_async+0xdc/0x410 [ 1097.953425][T12755] __should_failslab+0x81/0x90 [ 1097.958236][T12755] should_failslab+0x5/0x20 [ 1097.962776][T12755] __kmalloc+0x66/0x340 [ 1097.967012][T12755] ? io_req_prep_async+0xdc/0x410 [ 1097.972101][T12755] io_req_prep_async+0xdc/0x410 [ 1097.976970][T12755] io_submit_sqe+0x14ca/0x33a0 [ 1097.981750][T12755] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1097.987252][T12755] io_submit_sqes+0x5bd/0xbd0 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xb00) [ 1097.991946][T12755] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1097.997488][T12755] ? fput+0x2d/0x130 [ 1098.001421][T12755] __x64_sys_io_uring_enter+0x74/0x80 [ 1098.006837][T12755] do_syscall_64+0x4a/0x90 [ 1098.011302][T12755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.017302][T12755] RIP: 0033:0x4665d9 [ 1098.021235][T12755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040504", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x7000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x8000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 5 (fault-call:4 fault-nth:65): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1098.040885][T12755] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1098.049305][T12755] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1098.057335][T12755] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1098.065359][T12755] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.073334][T12755] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1098.081375][T12755] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040604", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1098.102999][T12776] loop2: detected capacity change from 0 to 4 [ 1098.158474][T12796] FAULT_INJECTION: forcing a failure. [ 1098.158474][T12796] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.180233][T12796] CPU: 1 PID: 12796 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1098.189006][T12796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.199087][T12796] Call Trace: [ 1098.202371][T12796] dump_stack+0x137/0x19d 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xc00) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xf000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040704", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1098.206755][T12796] should_fail+0x23c/0x250 [ 1098.211174][T12796] ? io_req_prep_async+0xdc/0x410 [ 1098.214083][T12802] loop0: detected capacity change from 0 to 4096 [ 1098.216196][T12796] __should_failslab+0x81/0x90 [ 1098.227329][T12796] should_failslab+0x5/0x20 [ 1098.231922][T12796] __kmalloc+0x66/0x340 [ 1098.236131][T12796] ? io_req_prep_async+0xdc/0x410 [ 1098.241176][T12796] io_req_prep_async+0xdc/0x410 [ 1098.246131][T12796] io_submit_sqe+0x14ca/0x33a0 [ 1098.250907][T12796] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1098.256384][T12796] io_submit_sqes+0x5bd/0xbd0 [ 1098.261148][T12796] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1098.266635][T12796] ? fput+0x2d/0x130 [ 1098.270544][T12796] __x64_sys_io_uring_enter+0x74/0x80 [ 1098.275974][T12796] do_syscall_64+0x4a/0x90 [ 1098.280931][T12796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.287060][T12796] RIP: 0033:0x4665d9 [ 1098.290976][T12796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.291062][T12802] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1098.310646][T12796] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1098.310681][T12796] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1098.338026][T12796] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1098.346002][T12796] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x10000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffff00000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000001202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xd00) 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040804", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1098.354011][T12796] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1098.362014][T12796] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:53 executing program 5 (fault-call:4 fault-nth:66): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x10000120}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xe00) 08:33:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x10080000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1098.457419][T12834] loop2: detected capacity change from 0 to 4 [ 1098.477008][T12841] FAULT_INJECTION: forcing a failure. [ 1098.477008][T12841] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.489711][T12841] CPU: 1 PID: 12841 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 08:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000041104", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1098.498526][T12841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.508594][T12841] Call Trace: [ 1098.511873][T12841] dump_stack+0x137/0x19d [ 1098.516217][T12841] should_fail+0x23c/0x250 [ 1098.520650][T12841] ? io_req_prep_async+0xdc/0x410 [ 1098.525676][T12841] __should_failslab+0x81/0x90 [ 1098.530445][T12841] should_failslab+0x5/0x20 [ 1098.535023][T12841] __kmalloc+0x66/0x340 [ 1098.539183][T12841] ? io_req_prep_async+0xdc/0x410 [ 1098.544207][T12841] io_req_prep_async+0xdc/0x410 [ 1098.549089][T12841] io_submit_sqe+0x14ca/0x33a0 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x11000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1098.553853][T12841] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1098.559322][T12841] io_submit_sqes+0x5bd/0xbd0 [ 1098.564010][T12841] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1098.569522][T12841] ? fput+0x2d/0x130 [ 1098.573466][T12841] __x64_sys_io_uring_enter+0x74/0x80 [ 1098.578955][T12841] do_syscall_64+0x4a/0x90 [ 1098.583373][T12841] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.589274][T12841] RIP: 0033:0x4665d9 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf00) 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000041804", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1098.593191][T12841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.612872][T12841] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1098.621294][T12841] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1098.629263][T12841] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1098.637236][T12841] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.645230][T12841] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1098.653218][T12841] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffff50000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000002002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x20010010}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:54 executing program 5 (fault-call:4 fault-nth:67): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1100) 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000041c04", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x28000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1098.711623][T12878] loop0: detected capacity change from 0 to 4096 [ 1098.733061][T12878] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1098.797041][T12896] FAULT_INJECTION: forcing a failure. [ 1098.797041][T12896] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.809710][T12896] CPU: 0 PID: 12896 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1098.818583][T12896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.828811][T12896] Call Trace: [ 1098.832108][T12896] dump_stack+0x137/0x19d [ 1098.836449][T12896] should_fail+0x23c/0x250 [ 1098.840895][T12896] ? io_req_prep_async+0xdc/0x410 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000042604", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3f000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x40000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1098.845935][T12896] __should_failslab+0x81/0x90 [ 1098.850768][T12896] should_failslab+0x5/0x20 [ 1098.855348][T12896] __kmalloc+0x66/0x340 [ 1098.859537][T12896] ? io_req_prep_async+0xdc/0x410 [ 1098.864564][T12896] io_req_prep_async+0xdc/0x410 [ 1098.869419][T12896] io_submit_sqe+0x14ca/0x33a0 [ 1098.874265][T12896] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1098.879736][T12896] io_submit_sqes+0x5bd/0xbd0 [ 1098.884456][T12896] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1098.889977][T12896] ? fput+0x2d/0x130 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x60000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1098.893889][T12896] __x64_sys_io_uring_enter+0x74/0x80 [ 1098.899317][T12896] do_syscall_64+0x4a/0x90 [ 1098.903775][T12896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.909698][T12896] RIP: 0033:0x4665d9 [ 1098.913597][T12896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.933216][T12896] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1200) [ 1098.941637][T12896] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1098.949617][T12896] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1098.951248][T12898] loop2: detected capacity change from 0 to 4 [ 1098.957714][T12896] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.957731][T12896] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1098.957744][T12896] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1098.996088][T12923] loop0: detected capacity change from 0 to 4096 08:33:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffff60000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000000004fe04", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 5 (fault-call:4 fault-nth:68): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xe0ffffff}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000102002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1300) [ 1099.052933][T12923] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1099.123066][T12950] FAULT_INJECTION: forcing a failure. [ 1099.123066][T12950] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.135742][T12950] CPU: 0 PID: 12950 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1099.144514][T12950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.154601][T12950] Call Trace: [ 1099.157882][T12950] dump_stack+0x137/0x19d [ 1099.162225][T12950] should_fail+0x23c/0x250 [ 1099.166719][T12950] ? io_req_prep_async+0xdc/0x410 [ 1099.171756][T12950] __should_failslab+0x81/0x90 [ 1099.176538][T12950] should_failslab+0x5/0x20 [ 1099.179728][T12952] loop2: detected capacity change from 0 to 4 [ 1099.181063][T12950] __kmalloc+0x66/0x340 [ 1099.191306][T12950] ? io_req_prep_async+0xdc/0x410 [ 1099.196368][T12950] io_req_prep_async+0xdc/0x410 [ 1099.201243][T12950] io_submit_sqe+0x14ca/0x33a0 [ 1099.206019][T12950] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1099.211500][T12950] io_submit_sqes+0x5bd/0xbd0 [ 1099.216178][T12950] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1099.221640][T12950] ? fput+0x2d/0x130 [ 1099.225613][T12950] __x64_sys_io_uring_enter+0x74/0x80 [ 1099.230988][T12950] do_syscall_64+0x4a/0x90 [ 1099.235402][T12950] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.241385][T12950] RIP: 0033:0x4665d9 [ 1099.245362][T12950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.264993][T12950] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040005", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1400) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xf5ffffff}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfc000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1099.273443][T12950] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1099.281432][T12950] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1099.289429][T12950] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.297403][T12950] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1099.305375][T12950] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1500) 08:33:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000002202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000ff80000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfe800000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1099.344979][T12971] loop0: detected capacity change from 0 to 4096 [ 1099.368339][T12971] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:54 executing program 5 (fault-call:4 fault-nth:69): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040020", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1600) [ 1099.419355][T12988] loop2: detected capacity change from 0 to 4 [ 1099.486730][T13007] FAULT_INJECTION: forcing a failure. [ 1099.486730][T13007] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.499513][T13007] CPU: 1 PID: 13007 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1099.508313][T13007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.518386][T13007] Call Trace: [ 1099.521661][T13007] dump_stack+0x137/0x19d [ 1099.526076][T13007] should_fail+0x23c/0x250 [ 1099.530504][T13007] ? io_req_prep_async+0xdc/0x410 08:33:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfe80ffff}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000002502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040040", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1099.535537][T13007] __should_failslab+0x81/0x90 [ 1099.540309][T13007] should_failslab+0x5/0x20 [ 1099.544846][T13007] __kmalloc+0x66/0x340 [ 1099.549038][T13007] ? io_req_prep_async+0xdc/0x410 [ 1099.554093][T13007] io_req_prep_async+0xdc/0x410 [ 1099.558959][T13007] io_submit_sqe+0x14ca/0x33a0 [ 1099.563744][T13007] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1099.569241][T13007] io_submit_sqes+0x5bd/0xbd0 [ 1099.573923][T13007] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1099.579399][T13007] ? fput+0x2d/0x130 08:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1700) 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000000004fffe", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfec0ffff}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1099.583442][T13007] __x64_sys_io_uring_enter+0x74/0x80 [ 1099.588933][T13007] do_syscall_64+0x4a/0x90 [ 1099.593425][T13007] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.599335][T13007] RIP: 0033:0x4665d9 [ 1099.603260][T13007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.622879][T13007] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:55 executing program 5 (fault-call:4 fault-nth:70): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1099.631306][T13007] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1099.639369][T13007] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1099.647347][T13007] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.655327][T13007] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1099.663310][T13007] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1099.680564][T13023] loop2: detected capacity change from 0 to 4 [ 1099.691978][T13010] loop0: detected capacity change from 0 to 4096 [ 1099.726382][T13042] FAULT_INJECTION: forcing a failure. [ 1099.726382][T13042] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.739085][T13042] CPU: 1 PID: 13042 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1099.747976][T13042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.758072][T13042] Call Trace: [ 1099.761356][T13042] dump_stack+0x137/0x19d [ 1099.765751][T13042] should_fail+0x23c/0x250 [ 1099.770213][T13042] ? io_req_prep_async+0xdc/0x410 [ 1099.775241][T13042] __should_failslab+0x81/0x90 [ 1099.780084][T13042] should_failslab+0x5/0x20 [ 1099.784633][T13042] __kmalloc+0x66/0x340 [ 1099.788791][T13042] ? io_req_prep_async+0xdc/0x410 [ 1099.793818][T13042] io_req_prep_async+0xdc/0x410 [ 1099.798760][T13042] io_submit_sqe+0x14ca/0x33a0 [ 1099.803530][T13042] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1099.809091][T13042] io_submit_sqes+0x5bd/0xbd0 [ 1099.813780][T13042] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1099.819257][T13042] ? fput+0x2d/0x130 [ 1099.823271][T13042] __x64_sys_io_uring_enter+0x74/0x80 [ 1099.828654][T13042] do_syscall_64+0x4a/0x90 [ 1099.833344][T13042] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.839313][T13042] RIP: 0033:0x4665d9 [ 1099.843258][T13042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.862867][T13042] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1099.871291][T13042] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1099.879287][T13042] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffdf90000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040000", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xff000000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1800) 08:33:55 executing program 5 (fault-call:4 fault-nth:71): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000002e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xffff0000}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1099.887262][T13042] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.895289][T13042] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1099.903277][T13042] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1099.923308][T13010] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000000004ffff", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xffff80fe}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xffffc0fe}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1100.009636][T13068] loop2: detected capacity change from 0 to 4 [ 1100.013041][T13065] FAULT_INJECTION: forcing a failure. [ 1100.013041][T13065] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.028560][T13065] CPU: 0 PID: 13065 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1100.037339][T13065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.047446][T13065] Call Trace: [ 1100.050732][T13065] dump_stack+0x137/0x19d [ 1100.055086][T13065] should_fail+0x23c/0x250 08:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1900) 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f00000000000004ffff", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1100.059519][T13065] __should_failslab+0x81/0x90 [ 1100.064384][T13065] should_failslab+0x5/0x20 [ 1100.068941][T13065] kmem_cache_alloc_bulk+0x40/0x340 [ 1100.074151][T13065] io_submit_sqes+0x4a3/0xbd0 [ 1100.078831][T13065] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1100.084417][T13065] ? fput+0x2d/0x130 [ 1100.088317][T13065] __x64_sys_io_uring_enter+0x74/0x80 [ 1100.093823][T13065] do_syscall_64+0x4a/0x90 [ 1100.098241][T13065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.104208][T13065] RIP: 0033:0x4665d9 [ 1100.108116][T13065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.127790][T13065] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1100.136207][T13065] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1100.144281][T13065] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1100.152270][T13065] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.160249][T13065] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1100.168227][T13065] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffffb0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 5 (fault-call:4 fault-nth:72): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000003f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xffffff7f}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1a00) [ 1100.242487][T13094] loop0: detected capacity change from 0 to 4096 [ 1100.261046][T13094] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xffffffe0}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040003", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1b00) [ 1100.311710][T13109] FAULT_INJECTION: forcing a failure. [ 1100.311710][T13109] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.324843][T13109] CPU: 0 PID: 13109 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1100.333653][T13109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.343787][T13109] Call Trace: [ 1100.347099][T13109] dump_stack+0x137/0x19d [ 1100.351438][T13109] should_fail+0x23c/0x250 [ 1100.355861][T13109] ? io_req_prep_async+0xdc/0x410 08:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1c00) [ 1100.360892][T13109] __should_failslab+0x81/0x90 [ 1100.365720][T13109] should_failslab+0x5/0x20 [ 1100.370229][T13109] __kmalloc+0x66/0x340 [ 1100.374454][T13109] ? io_req_prep_async+0xdc/0x410 [ 1100.379481][T13109] io_req_prep_async+0xdc/0x410 [ 1100.384361][T13109] io_submit_sqe+0x14ca/0x33a0 [ 1100.389134][T13109] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1100.394609][T13109] io_submit_sqes+0x5bd/0xbd0 [ 1100.399329][T13109] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1100.404823][T13109] ? fput+0x2d/0x130 08:33:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xfffffff5}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1100.408717][T13109] __x64_sys_io_uring_enter+0x74/0x80 [ 1100.414115][T13109] do_syscall_64+0x4a/0x90 [ 1100.418589][T13109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.424503][T13109] RIP: 0033:0x4665d9 [ 1100.428429][T13109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.441219][T13113] loop2: detected capacity change from 0 to 4 [ 1100.448048][T13109] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040005", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1100.448076][T13109] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1100.448089][T13109] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1100.448102][T13109] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.486662][T13109] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1100.494633][T13109] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffdfd0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000004002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040010", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x18, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1d00) 08:33:56 executing program 5 (fault-call:4 fault-nth:73): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1b, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1100.551936][T13147] loop0: detected capacity change from 0 to 4096 [ 1100.582696][T13147] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x2000001c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000000000000400fe", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1100.644985][T13164] loop2: detected capacity change from 0 to 4 [ 1100.664609][T13166] FAULT_INJECTION: forcing a failure. [ 1100.664609][T13166] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.677320][T13166] CPU: 0 PID: 13166 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1e00) [ 1100.686095][T13166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.696160][T13166] Call Trace: [ 1100.699456][T13166] dump_stack+0x137/0x19d [ 1100.703825][T13166] should_fail+0x23c/0x250 [ 1100.708246][T13166] ? io_req_prep_async+0xdc/0x410 [ 1100.713288][T13166] __should_failslab+0x81/0x90 [ 1100.718143][T13166] should_failslab+0x5/0x20 [ 1100.722754][T13166] __kmalloc+0x66/0x340 [ 1100.726924][T13166] ? io_req_prep_async+0xdc/0x410 [ 1100.732027][T13166] io_req_prep_async+0xdc/0x410 [ 1100.736880][T13166] io_submit_sqe+0x14ca/0x33a0 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x2000009c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1100.741743][T13166] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1100.747214][T13166] io_submit_sqes+0x5bd/0xbd0 [ 1100.751992][T13166] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1100.757457][T13166] ? fput+0x2d/0x130 [ 1100.761351][T13166] __x64_sys_io_uring_enter+0x74/0x80 [ 1100.766763][T13166] do_syscall_64+0x4a/0x90 [ 1100.771528][T13166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.777428][T13166] RIP: 0033:0x4665d9 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000000000000400fe", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1100.781320][T13166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.800991][T13166] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1100.809409][T13166] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1100.817440][T13166] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1100.825419][T13166] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.831132][T13184] loop0: detected capacity change from 0 to 4096 08:33:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000003fe0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200008004002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f60249662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1f00) 08:33:56 executing program 5 (fault-call:4 fault-nth:74): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1100.833415][T13166] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1100.833433][T13166] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1100.877948][T13184] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000000000000400fe", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1100.957455][T13214] loop0: detected capacity change from 0 to 4096 [ 1100.983725][T13214] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1100.997124][T13228] FAULT_INJECTION: forcing a failure. [ 1100.997124][T13228] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.010002][T13228] CPU: 0 PID: 13228 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1101.013667][T13226] loop2: detected capacity change from 0 to 4 [ 1101.018771][T13228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.018786][T13228] Call Trace: [ 1101.018795][T13228] dump_stack+0x137/0x19d [ 1101.042887][T13228] should_fail+0x23c/0x250 [ 1101.047326][T13228] ? io_req_prep_async+0xdc/0x410 [ 1101.052420][T13228] __should_failslab+0x81/0x90 08:33:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffffe0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79200283cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f0000000000000400fe", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2000) [ 1101.057200][T13228] should_failslab+0x5/0x20 [ 1101.061720][T13228] __kmalloc+0x66/0x340 [ 1101.065896][T13228] ? io_req_prep_async+0xdc/0x410 [ 1101.070942][T13228] io_req_prep_async+0xdc/0x410 [ 1101.075801][T13228] io_submit_sqe+0x14ca/0x33a0 [ 1101.080573][T13228] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1101.086047][T13228] io_submit_sqes+0x5bd/0xbd0 [ 1101.090748][T13228] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1101.096242][T13228] ? fput+0x2d/0x130 [ 1101.100156][T13228] __x64_sys_io_uring_enter+0x74/0x80 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x5c8}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1101.105592][T13228] do_syscall_64+0x4a/0x90 [ 1101.110061][T13228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.115971][T13228] RIP: 0033:0x4665d9 [ 1101.119886][T13228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.139523][T13228] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1101.148279][T13228] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x9d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2100) [ 1101.157759][T13228] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1101.165738][T13228] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.173717][T13228] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1101.181701][T13228] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000004802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfe, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x200000e8}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2200) 08:33:56 executing program 5 (fault-call:4 fault-nth:75): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1101.272923][T13265] loop0: detected capacity change from 0 to 4096 [ 1101.305351][T13265] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000fff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xf80, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x7ffff000}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2300) [ 1101.357395][T13286] FAULT_INJECTION: forcing a failure. [ 1101.357395][T13286] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.370086][T13286] CPU: 0 PID: 13286 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1101.378864][T13286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.389029][T13286] Call Trace: [ 1101.392336][T13286] dump_stack+0x137/0x19d [ 1101.396735][T13286] should_fail+0x23c/0x250 [ 1101.401165][T13286] ? io_req_prep_async+0xdc/0x410 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2400) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x20000) [ 1101.406196][T13286] __should_failslab+0x81/0x90 [ 1101.410976][T13286] should_failslab+0x5/0x20 [ 1101.415493][T13286] __kmalloc+0x66/0x340 [ 1101.419669][T13286] ? io_req_prep_async+0xdc/0x410 [ 1101.424709][T13286] io_req_prep_async+0xdc/0x410 [ 1101.429622][T13286] io_submit_sqe+0x14ca/0x33a0 [ 1101.434530][T13286] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1101.440045][T13286] io_submit_sqes+0x5bd/0xbd0 [ 1101.444798][T13286] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1101.450277][T13286] ? fput+0x2d/0x130 [ 1101.454179][T13286] __x64_sys_io_uring_enter+0x74/0x80 [ 1101.459596][T13286] do_syscall_64+0x4a/0x90 [ 1101.464080][T13286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.469992][T13286] RIP: 0033:0x4665d9 [ 1101.474027][T13286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.492554][T13290] loop2: detected capacity change from 0 to 4 [ 1101.493813][T13286] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0xfffffdef}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000004c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x40000) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x2}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1101.493839][T13286] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1101.493853][T13286] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1101.524279][T13286] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.532262][T13286] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1101.540245][T13286] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfdef, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:57 executing program 5 (fault-call:4 fault-nth:76): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffefff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1000000) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x3}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfffe, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000006002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1101.633695][T13331] loop0: detected capacity change from 0 to 4096 [ 1101.648306][T13335] loop2: detected capacity change from 0 to 4 [ 1101.666110][T13331] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x4}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1101.739765][T13351] FAULT_INJECTION: forcing a failure. [ 1101.739765][T13351] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.752492][T13351] CPU: 0 PID: 13351 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1101.761273][T13351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.771340][T13351] Call Trace: [ 1101.774624][T13351] dump_stack+0x137/0x19d [ 1101.778963][T13351] should_fail+0x23c/0x250 [ 1101.783383][T13351] ? io_req_prep_async+0xdc/0x410 08:33:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x87eef80, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1101.788418][T13351] __should_failslab+0x81/0x90 [ 1101.793214][T13351] should_failslab+0x5/0x20 [ 1101.796127][T13360] loop2: detected capacity change from 0 to 4 [ 1101.797732][T13351] __kmalloc+0x66/0x340 [ 1101.807998][T13351] ? io_req_prep_async+0xdc/0x410 [ 1101.813045][T13351] io_req_prep_async+0xdc/0x410 [ 1101.818005][T13351] io_submit_sqe+0x14ca/0x33a0 [ 1101.822770][T13351] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1101.828292][T13351] io_submit_sqes+0x5bd/0xbd0 [ 1101.832974][T13351] __se_sys_io_uring_enter+0x1e1/0xa80 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x5}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1101.838436][T13351] ? fput+0x2d/0x130 [ 1101.842334][T13351] __x64_sys_io_uring_enter+0x74/0x80 [ 1101.847727][T13351] do_syscall_64+0x4a/0x90 [ 1101.852163][T13351] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.858168][T13351] RIP: 0033:0x4665d9 [ 1101.862093][T13351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.881709][T13351] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2000000) [ 1101.890134][T13351] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1101.898114][T13351] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1101.906094][T13351] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.914251][T13351] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1101.922230][T13351] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000006802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x6}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1101.982689][T13382] loop0: detected capacity change from 0 to 4096 [ 1102.012709][T13382] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:57 executing program 5 (fault-call:4 fault-nth:77): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffbff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x3000000) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x7}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x20012e1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1102.044752][T13391] loop2: detected capacity change from 0 to 4 08:33:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000006c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1102.126046][T13406] loop0: detected capacity change from 0 to 4096 [ 1102.135728][T13411] FAULT_INJECTION: forcing a failure. [ 1102.135728][T13411] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.148503][T13411] CPU: 0 PID: 13411 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1102.157403][T13411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.167468][T13411] Call Trace: [ 1102.170759][T13411] dump_stack+0x137/0x19d [ 1102.175102][T13411] should_fail+0x23c/0x250 [ 1102.179524][T13411] ? io_req_prep_async+0xdc/0x410 [ 1102.184563][T13411] __should_failslab+0x81/0x90 [ 1102.189343][T13411] should_failslab+0x5/0x20 [ 1102.193939][T13411] __kmalloc+0x66/0x340 [ 1102.198119][T13411] ? io_req_prep_async+0xdc/0x410 [ 1102.203277][T13411] io_req_prep_async+0xdc/0x410 [ 1102.208139][T13411] io_submit_sqe+0x14ca/0x33a0 [ 1102.212962][T13411] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1102.218511][T13411] io_submit_sqes+0x5bd/0xbd0 [ 1102.223287][T13411] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1102.228771][T13411] ? fput+0x2d/0x130 [ 1102.232678][T13411] __x64_sys_io_uring_enter+0x74/0x80 [ 1102.238163][T13411] do_syscall_64+0x4a/0x90 [ 1102.242623][T13411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.248558][T13411] RIP: 0033:0x4665d9 [ 1102.252453][T13411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:57 executing program 5 (fault-call:4 fault-nth:78): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x8}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1102.272111][T13411] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1102.280535][T13411] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1102.288516][T13411] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1102.296615][T13411] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.304617][T13411] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1102.312597][T13411] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1102.375825][T13425] FAULT_INJECTION: forcing a failure. [ 1102.375825][T13425] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.388615][T13425] CPU: 1 PID: 13425 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1102.397419][T13425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.407579][T13425] Call Trace: [ 1102.410867][T13425] dump_stack+0x137/0x19d [ 1102.415273][T13425] should_fail+0x23c/0x250 [ 1102.419771][T13425] ? io_req_prep_async+0xdc/0x410 [ 1102.424814][T13425] __should_failslab+0x81/0x90 [ 1102.429612][T13425] should_failslab+0x5/0x20 [ 1102.434145][T13425] __kmalloc+0x66/0x340 [ 1102.438321][T13425] ? io_req_prep_async+0xdc/0x410 [ 1102.443355][T13425] io_req_prep_async+0xdc/0x410 [ 1102.448235][T13425] io_submit_sqe+0x14ca/0x33a0 [ 1102.453003][T13425] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1102.458479][T13425] io_submit_sqes+0x5bd/0xbd0 [ 1102.463248][T13425] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1102.468757][T13425] ? fput+0x2d/0x130 [ 1102.472650][T13425] __x64_sys_io_uring_enter+0x74/0x80 [ 1102.478118][T13425] do_syscall_64+0x4a/0x90 [ 1102.482572][T13425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.488497][T13425] RIP: 0033:0x4665d9 [ 1102.492419][T13425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.513155][T13425] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0xb}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x300}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x7f000001}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x4000000) 08:33:58 executing program 5 (fault-call:4 fault-nth:79): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1102.521627][T13425] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1102.529602][T13425] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1102.537604][T13425] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.545610][T13425] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1102.553581][T13425] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1102.567987][T13422] loop2: detected capacity change from 0 to 4 [ 1102.662615][T13454] FAULT_INJECTION: forcing a failure. [ 1102.662615][T13454] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.675332][T13454] CPU: 0 PID: 13454 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1102.684225][T13454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.694314][T13454] Call Trace: [ 1102.697591][T13454] dump_stack+0x137/0x19d [ 1102.701972][T13454] should_fail+0x23c/0x250 [ 1102.706402][T13454] ? io_req_prep_async+0xdc/0x410 [ 1102.711464][T13454] __should_failslab+0x81/0x90 [ 1102.716229][T13454] should_failslab+0x5/0x20 [ 1102.720747][T13454] __kmalloc+0x66/0x340 [ 1102.724975][T13454] ? io_req_prep_async+0xdc/0x410 [ 1102.729994][T13454] io_req_prep_async+0xdc/0x410 [ 1102.734840][T13454] io_submit_sqe+0x14ca/0x33a0 [ 1102.739762][T13454] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1102.745223][T13454] io_submit_sqes+0x5bd/0xbd0 [ 1102.749904][T13454] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1102.755461][T13454] ? fput+0x2d/0x130 [ 1102.759351][T13454] __x64_sys_io_uring_enter+0x74/0x80 [ 1102.764745][T13454] do_syscall_64+0x4a/0x90 [ 1102.769162][T13454] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.775055][T13454] RIP: 0033:0x4665d9 [ 1102.778957][T13454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.799212][T13454] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0003ffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0xac14140a}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000007402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1102.808947][T13454] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1102.816944][T13454] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1102.825922][T13454] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.834154][T13454] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1102.842443][T13454] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x7ffff000, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x5000000) [ 1102.852790][T13406] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0xac14140b}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000007a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1102.891592][T13465] loop2: detected capacity change from 0 to 4 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x6000000) [ 1102.951699][T13478] loop0: detected capacity change from 0 to 4096 08:33:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f001fffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1102.993782][T13478] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1102.997456][T13488] loop2: detected capacity change from 0 to 4 08:33:58 executing program 5 (fault-call:4 fault-nth:80): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20ffffff8c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x7000000) [ 1103.117254][T13509] loop0: detected capacity change from 0 to 4096 [ 1103.138043][T13509] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1103.223025][T13523] FAULT_INJECTION: forcing a failure. [ 1103.223025][T13523] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.235793][T13523] CPU: 0 PID: 13523 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1103.244572][T13523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.254631][T13523] Call Trace: [ 1103.257908][T13523] dump_stack+0x137/0x19d [ 1103.262247][T13523] should_fail+0x23c/0x250 [ 1103.266677][T13523] __should_failslab+0x81/0x90 [ 1103.271460][T13523] should_failslab+0x5/0x20 [ 1103.276127][T13523] kmem_cache_alloc_bulk+0x40/0x340 [ 1103.281445][T13523] io_submit_sqes+0x4a3/0xbd0 [ 1103.286126][T13523] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1103.291600][T13523] ? fput+0x2d/0x130 [ 1103.293125][T13533] loop2: detected capacity change from 0 to 4 [ 1103.295500][T13523] __x64_sys_io_uring_enter+0x74/0x80 [ 1103.306966][T13523] do_syscall_64+0x4a/0x90 [ 1103.311400][T13523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1103.317313][T13523] RIP: 0033:0x4665d9 08:33:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfffffdef, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00e0ffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:33:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x8000000) [ 1103.321215][T13523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.340835][T13523] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1103.349524][T13523] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1103.357512][T13523] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1103.365501][T13523] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20a8a6309502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1103.373502][T13523] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1103.381498][T13523] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1103.400692][T13535] loop0: detected capacity change from 0 to 4096 08:33:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x9000000) 08:33:58 executing program 5 (fault-call:4 fault-nth:81): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffefffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1103.436257][T13535] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1103.499392][T13556] loop2: detected capacity change from 0 to 4 [ 1103.534582][T13565] FAULT_INJECTION: forcing a failure. [ 1103.534582][T13565] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.547276][T13565] CPU: 0 PID: 13565 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1103.556087][T13565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.566154][T13565] Call Trace: [ 1103.569528][T13565] dump_stack+0x137/0x19d [ 1103.573872][T13565] should_fail+0x23c/0x250 [ 1103.578381][T13565] ? io_req_prep_async+0xdc/0x410 [ 1103.583418][T13565] __should_failslab+0x81/0x90 [ 1103.588195][T13565] should_failslab+0x5/0x20 [ 1103.592751][T13565] __kmalloc+0x66/0x340 08:33:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfffffffe, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xa000000) [ 1103.596990][T13565] ? io_req_prep_async+0xdc/0x410 [ 1103.602029][T13565] io_req_prep_async+0xdc/0x410 [ 1103.606897][T13565] io_submit_sqe+0x14ca/0x33a0 [ 1103.611771][T13565] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1103.617243][T13565] io_submit_sqes+0x5bd/0xbd0 [ 1103.621927][T13565] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1103.627424][T13565] ? fput+0x2d/0x130 [ 1103.631332][T13565] __x64_sys_io_uring_enter+0x74/0x80 [ 1103.636721][T13565] do_syscall_64+0x4a/0x90 [ 1103.641179][T13565] entry_SYSCALL_64_after_hwframe+0x44/0xae 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1103.647100][T13565] RIP: 0033:0x4665d9 [ 1103.651002][T13565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.670636][T13565] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1103.679079][T13565] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1103.687072][T13565] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 08:33:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x7ffffffffffeef7f, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xb}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1103.695066][T13565] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.703056][T13565] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1103.711033][T13565] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20ffffff9702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xb000000) [ 1103.756654][T13584] loop0: detected capacity change from 0 to 4096 08:33:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffbffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1103.799284][T13584] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:59 executing program 5 (fault-call:4 fault-nth:82): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xc000000) 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xf}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1103.870728][T13602] loop2: detected capacity change from 0 to 4 [ 1103.920565][T13610] FAULT_INJECTION: forcing a failure. [ 1103.920565][T13610] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.933279][T13610] CPU: 0 PID: 13610 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1103.942194][T13610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.952259][T13610] Call Trace: [ 1103.955565][T13610] dump_stack+0x137/0x19d [ 1103.959909][T13610] should_fail+0x23c/0x250 [ 1103.964365][T13610] ? io_req_prep_async+0xdc/0x410 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xd000000) 08:33:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="209530a6a802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1103.969423][T13610] __should_failslab+0x81/0x90 [ 1103.974301][T13610] should_failslab+0x5/0x20 [ 1103.978848][T13610] __kmalloc+0x66/0x340 [ 1103.983090][T13610] ? io_req_prep_async+0xdc/0x410 [ 1103.988124][T13610] io_req_prep_async+0xdc/0x410 [ 1103.992989][T13610] io_submit_sqe+0x14ca/0x33a0 [ 1103.997765][T13610] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1104.003239][T13610] io_submit_sqes+0x5bd/0xbd0 [ 1104.007932][T13610] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1104.013410][T13610] ? fput+0x2d/0x130 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x10}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfffffffffffffdef, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1104.017347][T13610] __x64_sys_io_uring_enter+0x74/0x80 [ 1104.022822][T13610] do_syscall_64+0x4a/0x90 [ 1104.025508][T13619] loop2: detected capacity change from 0 to 4 [ 1104.027249][T13610] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.039233][T13610] RIP: 0033:0x4665d9 [ 1104.043127][T13610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xe000000) 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x11}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000edc002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1104.064040][T13610] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1104.072571][T13610] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1104.080555][T13610] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1104.088593][T13610] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.096571][T13610] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1104.104612][T13610] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x28}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ff9fdffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1104.164155][T13638] loop0: detected capacity change from 0 to 4096 [ 1104.202924][T13638] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:33:59 executing program 5 (fault-call:4 fault-nth:83): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf000000) 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x60}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1104.225068][T13647] loop2: detected capacity change from 0 to 4 08:33:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfc}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:33:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20ffffffda02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1104.346882][T13663] FAULT_INJECTION: forcing a failure. [ 1104.346882][T13663] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.359563][T13663] CPU: 0 PID: 13663 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1104.368340][T13663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.378409][T13663] Call Trace: [ 1104.381688][T13663] dump_stack+0x137/0x19d [ 1104.386021][T13663] should_fail+0x23c/0x250 [ 1104.390453][T13663] ? io_req_prep_async+0xdc/0x410 [ 1104.395502][T13663] __should_failslab+0x81/0x90 [ 1104.400282][T13663] should_failslab+0x5/0x20 [ 1104.404797][T13663] __kmalloc+0x66/0x340 [ 1104.408990][T13663] ? io_req_prep_async+0xdc/0x410 [ 1104.414023][T13663] io_req_prep_async+0xdc/0x410 [ 1104.418371][T13666] loop0: detected capacity change from 0 to 4096 [ 1104.418905][T13663] io_submit_sqe+0x14ca/0x33a0 [ 1104.429981][T13663] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1104.435459][T13663] io_submit_sqes+0x5bd/0xbd0 [ 1104.440161][T13663] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1104.445705][T13663] ? fput+0x2d/0x130 [ 1104.449607][T13663] __x64_sys_io_uring_enter+0x74/0x80 [ 1104.454990][T13663] do_syscall_64+0x4a/0x90 [ 1104.459425][T13663] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.465338][T13663] RIP: 0033:0x4665d9 [ 1104.469231][T13663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.488841][T13663] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:33:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x10000000) [ 1104.497339][T13663] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1104.505374][T13663] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1104.513427][T13663] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.521442][T13663] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1104.529455][T13663] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xfffffffffffffffe, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x300}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:00 executing program 5 (fault-call:4 fault-nth:84): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffdfdffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1104.539317][T13666] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x500}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x11000000) [ 1104.624634][T13684] loop2: detected capacity change from 0 to 4 [ 1104.663778][T13696] FAULT_INJECTION: forcing a failure. [ 1104.663778][T13696] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.676469][T13696] CPU: 0 PID: 13696 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1104.685253][T13696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.695348][T13696] Call Trace: [ 1104.698689][T13696] dump_stack+0x137/0x19d [ 1104.703040][T13696] should_fail+0x23c/0x250 [ 1104.707473][T13696] ? io_req_prep_async+0xdc/0x410 [ 1104.710015][T13701] loop0: detected capacity change from 0 to 4096 [ 1104.712503][T13696] __should_failslab+0x81/0x90 [ 1104.712533][T13696] should_failslab+0x5/0x20 [ 1104.728109][T13696] __kmalloc+0x66/0x340 [ 1104.732577][T13696] ? io_req_prep_async+0xdc/0x410 [ 1104.737621][T13696] io_req_prep_async+0xdc/0x410 [ 1104.742485][T13696] io_submit_sqe+0x14ca/0x33a0 [ 1104.747254][T13696] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1104.752733][T13696] io_submit_sqes+0x5bd/0xbd0 [ 1104.757412][T13696] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1104.762882][T13696] ? fput+0x2d/0x130 [ 1104.766785][T13696] __x64_sys_io_uring_enter+0x74/0x80 [ 1104.772243][T13696] do_syscall_64+0x4a/0x90 [ 1104.776672][T13696] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.782590][T13696] RIP: 0033:0x4665d9 [ 1104.786494][T13696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.806115][T13696] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1104.814541][T13696] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 08:34:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000001ee02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x600}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1104.822523][T13696] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1104.830544][T13696] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.838528][T13696] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1104.846539][T13696] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x12000000) 08:34:00 executing program 5 (fault-call:4 fault-nth:85): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1104.886227][T13711] loop2: detected capacity change from 0 to 4 08:34:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000001f602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1104.944176][T13701] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1105.005541][T13729] FAULT_INJECTION: forcing a failure. [ 1105.005541][T13729] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.018259][T13729] CPU: 1 PID: 13729 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1105.027095][T13729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.037173][T13729] Call Trace: [ 1105.040484][T13729] dump_stack+0x137/0x19d [ 1105.044828][T13729] should_fail+0x23c/0x250 [ 1105.049255][T13729] ? io_req_prep_async+0xdc/0x410 [ 1105.054292][T13729] __should_failslab+0x81/0x90 [ 1105.059102][T13729] should_failslab+0x5/0x20 [ 1105.063642][T13729] __kmalloc+0x66/0x340 [ 1105.067912][T13729] ? io_req_prep_async+0xdc/0x410 [ 1105.072955][T13729] io_req_prep_async+0xdc/0x410 [ 1105.077816][T13729] io_submit_sqe+0x14ca/0x33a0 [ 1105.082595][T13729] io_submit_sqes+0x5bd/0xbd0 [ 1105.087328][T13729] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1105.092840][T13729] ? fput+0x2d/0x130 [ 1105.096749][T13729] __x64_sys_io_uring_enter+0x74/0x80 08:34:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f7fffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0xffffffffffffffff, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x700}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x13000000) [ 1105.102193][T13729] do_syscall_64+0x4a/0x90 [ 1105.106695][T13729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.112679][T13729] RIP: 0033:0x4665d9 [ 1105.116733][T13729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.138186][T13729] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1105.146682][T13729] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 08:34:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x14000000) 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x810}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:00 executing program 5 (fault-call:4 fault-nth:86): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1105.154667][T13729] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1105.162647][T13729] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1105.168149][T13733] loop2: detected capacity change from 0 to 4 [ 1105.170622][T13729] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1105.170659][T13729] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1105.276045][T13763] FAULT_INJECTION: forcing a failure. [ 1105.276045][T13763] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.278642][T13760] loop0: detected capacity change from 0 to 4096 [ 1105.288881][T13763] CPU: 1 PID: 13763 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1105.307773][T13763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.317845][T13763] Call Trace: [ 1105.321134][T13763] dump_stack+0x137/0x19d [ 1105.325502][T13763] should_fail+0x23c/0x250 [ 1105.329963][T13763] ? io_req_prep_async+0xdc/0x410 [ 1105.335024][T13763] __should_failslab+0x81/0x90 [ 1105.339800][T13763] should_failslab+0x5/0x20 [ 1105.344321][T13763] __kmalloc+0x66/0x340 [ 1105.348491][T13763] ? io_req_prep_async+0xdc/0x410 [ 1105.353557][T13763] io_req_prep_async+0xdc/0x410 [ 1105.358431][T13763] io_submit_sqe+0x14ca/0x33a0 [ 1105.363231][T13763] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1105.368784][T13763] io_submit_sqes+0x5bd/0xbd0 [ 1105.373473][T13763] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1105.378952][T13763] ? fput+0x2d/0x130 [ 1105.382936][T13763] __x64_sys_io_uring_enter+0x74/0x80 [ 1105.388352][T13763] do_syscall_64+0x4a/0x90 [ 1105.392787][T13763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.398867][T13763] RIP: 0033:0x4665d9 [ 1105.402769][T13763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:34:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffffff602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xf00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1105.419284][T13760] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1105.422386][T13763] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1105.422413][T13763] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1105.422425][T13763] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1105.457740][T13763] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1105.465728][T13763] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:34:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x15000000) 08:34:00 executing program 5 (fault-call:4 fault-nth:87): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f8cffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1105.473709][T13763] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x8800000}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x1008}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x7fffffffffffffff}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1105.516758][T13782] loop2: detected capacity change from 0 to 4 [ 1105.553341][T13791] FAULT_INJECTION: forcing a failure. [ 1105.553341][T13791] name failslab, interval 1, probability 0, space 0, times 0 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0xffffffffffffffff}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x16000000) 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1105.567103][T13791] CPU: 1 PID: 13791 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1105.575881][T13791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.585972][T13791] Call Trace: [ 1105.589346][T13791] dump_stack+0x137/0x19d [ 1105.593693][T13791] should_fail+0x23c/0x250 [ 1105.598146][T13791] ? io_req_prep_async+0xdc/0x410 [ 1105.603182][T13791] __should_failslab+0x81/0x90 [ 1105.607993][T13791] should_failslab+0x5/0x20 [ 1105.612529][T13791] __kmalloc+0x66/0x340 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1105.616717][T13791] ? io_req_prep_async+0xdc/0x410 [ 1105.621767][T13791] io_req_prep_async+0xdc/0x410 [ 1105.626633][T13791] io_submit_sqe+0x14ca/0x33a0 [ 1105.631431][T13791] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1105.636987][T13791] io_submit_sqes+0x5bd/0xbd0 [ 1105.641694][T13791] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1105.647447][T13791] ? fput+0x2d/0x130 [ 1105.651436][T13791] __x64_sys_io_uring_enter+0x74/0x80 [ 1105.656853][T13791] do_syscall_64+0x4a/0x90 [ 1105.661293][T13791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.667230][T13791] RIP: 0033:0x4665d9 [ 1105.671135][T13791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.690873][T13791] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1105.699326][T13791] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1105.707289][T13791] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1105.715264][T13791] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1105.723340][T13791] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1105.731321][T13791] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffffdf902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 5 (fault-call:4 fault-nth:88): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x1100}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1105.793433][T13820] loop0: detected capacity change from 0 to 4096 [ 1105.852753][T13820] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1105.870756][T13838] FAULT_INJECTION: forcing a failure. [ 1105.870756][T13838] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.878151][T13837] loop2: detected capacity change from 0 to 4 [ 1105.883417][T13838] CPU: 0 PID: 13838 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1105.898234][T13838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.908428][T13838] Call Trace: [ 1105.911726][T13838] dump_stack+0x137/0x19d [ 1105.916093][T13838] should_fail+0x23c/0x250 [ 1105.920538][T13838] ? io_req_prep_async+0xdc/0x410 [ 1105.925570][T13838] __should_failslab+0x81/0x90 [ 1105.930341][T13838] should_failslab+0x5/0x20 [ 1105.935054][T13838] __kmalloc+0x66/0x340 [ 1105.939215][T13838] ? io_req_prep_async+0xdc/0x410 [ 1105.944346][T13838] io_req_prep_async+0xdc/0x410 [ 1105.949296][T13838] io_submit_sqe+0x14ca/0x33a0 [ 1105.954067][T13838] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1105.959550][T13838] io_submit_sqes+0x5bd/0xbd0 [ 1105.964252][T13838] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1105.969808][T13838] ? fput+0x2d/0x130 [ 1105.973713][T13838] __x64_sys_io_uring_enter+0x74/0x80 [ 1105.979154][T13838] do_syscall_64+0x4a/0x90 [ 1105.983584][T13838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.989612][T13838] RIP: 0033:0x4665d9 08:34:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fdaffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x17000000) 08:34:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x2800}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1105.993554][T13838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.013342][T13838] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1106.021761][T13838] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1106.029741][T13838] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1106.037726][T13838] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.045878][T13838] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:34:01 executing program 5 (fault-call:4 fault-nth:89): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x3f00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1106.053895][T13838] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffffdfd02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x4000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1106.134896][T13859] FAULT_INJECTION: forcing a failure. [ 1106.134896][T13859] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.147668][T13859] CPU: 1 PID: 13859 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1106.156444][T13859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.166509][T13859] Call Trace: [ 1106.169852][T13859] dump_stack+0x137/0x19d [ 1106.174189][T13859] should_fail+0x23c/0x250 [ 1106.177477][T13866] loop0: detected capacity change from 0 to 4096 [ 1106.178628][T13859] __should_failslab+0x81/0x90 [ 1106.189780][T13859] should_failslab+0x5/0x20 [ 1106.194294][T13859] kmem_cache_alloc_bulk+0x40/0x340 [ 1106.199506][T13859] io_submit_sqes+0x4a3/0xbd0 [ 1106.204203][T13859] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1106.209691][T13859] ? fput+0x2d/0x130 [ 1106.213588][T13859] __x64_sys_io_uring_enter+0x74/0x80 [ 1106.219068][T13859] do_syscall_64+0x4a/0x90 [ 1106.223495][T13859] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1106.229408][T13859] RIP: 0033:0x4665d9 [ 1106.233308][T13859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.253007][T13859] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1106.261428][T13859] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1106.269490][T13859] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1106.277479][T13859] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x18000000) 08:34:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffffffd02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x6000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1106.285462][T13859] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1106.293440][T13859] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1106.303609][T13872] loop2: detected capacity change from 0 to 4 [ 1106.322008][T13866] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fe2ffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x19000000) 08:34:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x80fe}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:01 executing program 5 (fault-call:4 fault-nth:90): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffffffe02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1106.417604][T13895] loop2: detected capacity change from 0 to 4 [ 1106.521210][T13913] loop0: detected capacity change from 0 to 4096 [ 1106.553503][T13920] loop2: detected capacity change from 0 to 4 [ 1106.553933][T13923] FAULT_INJECTION: forcing a failure. 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfc00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1a000000) 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x11, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1106.553933][T13923] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.572284][T13923] CPU: 1 PID: 13923 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1106.581053][T13923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.591120][T13923] Call Trace: [ 1106.594399][T13923] dump_stack+0x137/0x19d [ 1106.598765][T13923] should_fail+0x23c/0x250 [ 1106.603230][T13923] ? io_req_prep_async+0xdc/0x410 [ 1106.608342][T13923] __should_failslab+0x81/0x90 [ 1106.613213][T13923] should_failslab+0x5/0x20 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfe80}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1106.617730][T13923] __kmalloc+0x66/0x340 [ 1106.621923][T13923] ? io_req_prep_async+0xdc/0x410 [ 1106.624849][T13913] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1106.626960][T13923] io_req_prep_async+0xdc/0x410 [ 1106.626985][T13923] io_submit_sqe+0x14ca/0x33a0 [ 1106.648303][T13923] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1106.653789][T13923] io_submit_sqes+0x5bd/0xbd0 [ 1106.658470][T13923] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1106.663940][T13923] ? fput+0x2d/0x130 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1b000000) [ 1106.667854][T13923] __x64_sys_io_uring_enter+0x74/0x80 [ 1106.673320][T13923] do_syscall_64+0x4a/0x90 [ 1106.677758][T13923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1106.683736][T13923] RIP: 0033:0x4665d9 [ 1106.687637][T13923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.707354][T13923] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 08:34:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ff0ffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x18, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 5 (fault-call:4 fault-nth:91): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1106.715870][T13923] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1106.723950][T13923] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1106.731973][T13923] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.740067][T13923] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1106.748035][T13923] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1106.824868][T13954] FAULT_INJECTION: forcing a failure. [ 1106.824868][T13954] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.837598][T13954] CPU: 0 PID: 13954 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1106.846380][T13954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.856533][T13954] Call Trace: [ 1106.859822][T13954] dump_stack+0x137/0x19d [ 1106.864173][T13954] should_fail+0x23c/0x250 [ 1106.868637][T13954] ? io_req_prep_async+0xdc/0x410 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xff00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000fff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1c000000) 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1c, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x34000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1106.873678][T13954] __should_failslab+0x81/0x90 [ 1106.878488][T13954] should_failslab+0x5/0x20 [ 1106.883015][T13954] __kmalloc+0x66/0x340 [ 1106.887322][T13954] ? io_req_prep_async+0xdc/0x410 [ 1106.892395][T13954] io_req_prep_async+0xdc/0x410 [ 1106.897287][T13954] io_submit_sqe+0x14ca/0x33a0 [ 1106.902100][T13954] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1106.907579][T13954] io_submit_sqes+0x5bd/0xbd0 [ 1106.912354][T13954] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1106.917839][T13954] ? fput+0x2d/0x130 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x26, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1106.921768][T13954] __x64_sys_io_uring_enter+0x74/0x80 [ 1106.927160][T13954] do_syscall_64+0x4a/0x90 [ 1106.931956][T13954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1106.937913][T13954] RIP: 0033:0x4665d9 [ 1106.941913][T13954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.950997][T13965] loop2: detected capacity change from 0 to 4 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1d000000) 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x40000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1106.961536][T13954] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1106.961565][T13954] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1106.961577][T13954] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1106.961590][T13954] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.961602][T13954] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1107.008153][T13954] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:02 executing program 5 (fault-call:4 fault-nth:92): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1107.066929][T13981] loop0: detected capacity change from 0 to 4096 [ 1107.114479][T13981] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1107.129427][T13995] FAULT_INJECTION: forcing a failure. [ 1107.129427][T13995] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.142168][T13995] CPU: 1 PID: 13995 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1107.151034][T13995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.161123][T13995] Call Trace: [ 1107.164401][T13995] dump_stack+0x137/0x19d [ 1107.168861][T13995] should_fail+0x23c/0x250 [ 1107.173291][T13995] ? io_req_prep_async+0xdc/0x410 [ 1107.178408][T13995] __should_failslab+0x81/0x90 [ 1107.183261][T13995] should_failslab+0x5/0x20 [ 1107.187776][T13995] __kmalloc+0x66/0x340 [ 1107.191944][T13995] ? io_req_prep_async+0xdc/0x410 [ 1107.196993][T13995] io_req_prep_async+0xdc/0x410 [ 1107.201855][T13995] io_submit_sqe+0x14ca/0x33a0 [ 1107.206688][T13995] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1107.212233][T13995] io_submit_sqes+0x5bd/0xbd0 [ 1107.217027][T13995] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1107.222495][T13995] ? fput+0x2d/0x130 [ 1107.226389][T13995] __x64_sys_io_uring_enter+0x74/0x80 [ 1107.231769][T13995] do_syscall_64+0x4a/0x90 [ 1107.236281][T13995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1107.242219][T13995] RIP: 0033:0x4665d9 08:34:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ff5ffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x50000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1e000000) 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfe, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffffbff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x100000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x204, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1f000000) [ 1107.246123][T13995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.265999][T13995] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1107.274424][T13995] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1107.282450][T13995] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1107.290442][T13995] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1107.298424][T13995] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1107.306412][T13995] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:02 executing program 5 (fault-call:4 fault-nth:93): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x400300}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x300, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x20000000) [ 1107.317203][T14007] loop2: detected capacity change from 0 to 4 [ 1107.408973][T14036] loop0: detected capacity change from 0 to 4096 [ 1107.420738][T14038] FAULT_INJECTION: forcing a failure. [ 1107.420738][T14038] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.433437][T14038] CPU: 0 PID: 14038 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1107.442222][T14038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.452317][T14038] Call Trace: [ 1107.455602][T14038] dump_stack+0x137/0x19d [ 1107.459950][T14038] should_fail+0x23c/0x250 [ 1107.464394][T14038] ? io_req_prep_async+0xdc/0x410 [ 1107.469428][T14038] __should_failslab+0x81/0x90 [ 1107.474207][T14038] should_failslab+0x5/0x20 [ 1107.478736][T14038] __kmalloc+0x66/0x340 [ 1107.482972][T14038] ? io_req_prep_async+0xdc/0x410 [ 1107.488003][T14038] io_req_prep_async+0xdc/0x410 [ 1107.492875][T14038] io_submit_sqe+0x14ca/0x33a0 [ 1107.497750][T14038] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1107.503217][T14038] io_submit_sqes+0x5bd/0xbd0 [ 1107.507897][T14038] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1107.513370][T14038] ? fput+0x2d/0x130 [ 1107.517270][T14038] __x64_sys_io_uring_enter+0x74/0x80 [ 1107.522658][T14038] do_syscall_64+0x4a/0x90 [ 1107.527141][T14038] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1107.533059][T14038] RIP: 0033:0x4665d9 [ 1107.536958][T14038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.557704][T14038] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1107.566186][T14038] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1107.574166][T14038] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1107.582144][T14038] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1107.590130][T14038] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1107.598113][T14038] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ff6ffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fffbffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x1000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x21000000) 08:34:03 executing program 5 (fault-call:4 fault-nth:94): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x402, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1107.620348][T14036] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x2000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x22000000) 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x3000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x23000000) [ 1107.738743][T14066] FAULT_INJECTION: forcing a failure. [ 1107.738743][T14066] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.751414][T14066] CPU: 1 PID: 14066 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1107.760236][T14066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.770295][T14066] Call Trace: [ 1107.773573][T14066] dump_stack+0x137/0x19d [ 1107.777913][T14066] should_fail+0x23c/0x250 [ 1107.782392][T14066] ? io_req_prep_async+0xdc/0x410 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x4000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1107.787448][T14066] __should_failslab+0x81/0x90 [ 1107.792223][T14066] should_failslab+0x5/0x20 [ 1107.796798][T14066] __kmalloc+0x66/0x340 [ 1107.800958][T14066] ? io_req_prep_async+0xdc/0x410 [ 1107.806007][T14066] io_req_prep_async+0xdc/0x410 [ 1107.810858][T14066] io_submit_sqe+0x14ca/0x33a0 [ 1107.815737][T14066] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1107.821204][T14066] io_submit_sqes+0x5bd/0xbd0 [ 1107.825916][T14066] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1107.831384][T14066] ? fput+0x2d/0x130 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x5000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1107.835324][T14066] __x64_sys_io_uring_enter+0x74/0x80 [ 1107.840712][T14066] do_syscall_64+0x4a/0x90 [ 1107.845192][T14066] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1107.851170][T14066] RIP: 0033:0x4665d9 [ 1107.855061][T14066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.874682][T14066] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1107.883109][T14066] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1107.891177][T14066] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1107.899164][T14066] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1107.907144][T14066] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1107.915152][T14066] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 [ 1107.927254][T14073] loop0: detected capacity change from 0 to 4096 [ 1107.929886][T14071] loop2: detected capacity change from 0 to 4 08:34:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffbffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20f9fdffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x24000000) 08:34:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x406, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x6000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:03 executing program 5 (fault-call:4 fault-nth:95): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1107.944218][T14073] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1108.046001][T14114] loop2: detected capacity change from 0 to 4 [ 1108.046598][T14116] FAULT_INJECTION: forcing a failure. [ 1108.046598][T14116] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.064727][T14116] CPU: 0 PID: 14116 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1108.073506][T14116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.083560][T14116] Call Trace: [ 1108.086852][T14116] dump_stack+0x137/0x19d [ 1108.091188][T14116] should_fail+0x23c/0x250 [ 1108.095607][T14116] ? io_req_prep_async+0xdc/0x410 [ 1108.100677][T14116] __should_failslab+0x81/0x90 [ 1108.105515][T14116] should_failslab+0x5/0x20 [ 1108.110029][T14116] __kmalloc+0x66/0x340 [ 1108.114195][T14116] ? io_req_prep_async+0xdc/0x410 [ 1108.119217][T14116] io_req_prep_async+0xdc/0x410 [ 1108.124064][T14116] io_submit_sqe+0x14ca/0x33a0 [ 1108.129955][T14116] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1108.135418][T14116] io_submit_sqes+0x5bd/0xbd0 [ 1108.140117][T14116] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1108.145613][T14116] ? fput+0x2d/0x130 [ 1108.149509][T14116] __x64_sys_io_uring_enter+0x74/0x80 [ 1108.154889][T14116] do_syscall_64+0x4a/0x90 [ 1108.159317][T14116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1108.165213][T14116] RIP: 0033:0x4665d9 [ 1108.169129][T14116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:34:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x480, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xeffdffff) 08:34:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fdfdffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x500, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x7000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1108.188734][T14116] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1108.197149][T14116] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1108.205116][T14116] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1108.213118][T14116] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1108.221087][T14116] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1108.229062][T14116] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:03 executing program 5 (fault-call:4 fault-nth:96): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) [ 1108.266936][T14126] loop0: detected capacity change from 0 to 4096 [ 1108.330202][T14143] FAULT_INJECTION: forcing a failure. [ 1108.330202][T14143] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.342899][T14143] CPU: 1 PID: 14143 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1108.349030][T14126] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1108.351672][T14143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.351688][T14143] Call Trace: [ 1108.363233][T14142] loop2: detected capacity change from 0 to 4 [ 1108.372839][T14143] dump_stack+0x137/0x19d [ 1108.372870][T14143] should_fail+0x23c/0x250 [ 1108.372889][T14143] ? io_req_prep_async+0xdc/0x410 [ 1108.398099][T14143] __should_failslab+0x81/0x90 [ 1108.402907][T14143] should_failslab+0x5/0x20 [ 1108.407424][T14143] __kmalloc+0x66/0x340 [ 1108.411593][T14143] ? io_req_prep_async+0xdc/0x410 [ 1108.416643][T14143] io_req_prep_async+0xdc/0x410 [ 1108.421577][T14143] io_submit_sqe+0x14ca/0x33a0 [ 1108.426362][T14143] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1108.431806][T14143] io_submit_sqes+0x5bd/0xbd0 [ 1108.436537][T14143] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1108.442012][T14143] ? fput+0x2d/0x130 [ 1108.445920][T14143] __x64_sys_io_uring_enter+0x74/0x80 [ 1108.451280][T14143] do_syscall_64+0x4a/0x90 [ 1108.455741][T14143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1108.461681][T14143] RIP: 0033:0x4665d9 [ 1108.465565][T14143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.485184][T14143] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1108.493628][T14143] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1108.501673][T14143] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1108.509626][T14143] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1108.517608][T14143] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 08:34:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x8000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf5ffffff) 08:34:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x533, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffeffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:03 executing program 5 (fault-call:4 fault-nth:97): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="207fffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1108.525618][T14143] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xf000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x600, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xfffffdef) [ 1108.648464][T14174] loop2: detected capacity change from 0 to 4 [ 1108.670685][T14171] FAULT_INJECTION: forcing a failure. [ 1108.670685][T14171] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.683359][T14171] CPU: 1 PID: 14171 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 08:34:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x10000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x604, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x700, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1108.692136][T14171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.692210][T14173] loop0: detected capacity change from 0 to 4096 [ 1108.702190][T14171] Call Trace: [ 1108.702201][T14171] dump_stack+0x137/0x19d [ 1108.716138][T14171] should_fail+0x23c/0x250 [ 1108.720584][T14171] ? io_req_prep_async+0xdc/0x410 [ 1108.725609][T14171] __should_failslab+0x81/0x90 [ 1108.730379][T14171] should_failslab+0x5/0x20 [ 1108.734966][T14171] __kmalloc+0x66/0x340 [ 1108.739129][T14171] ? io_req_prep_async+0xdc/0x410 [ 1108.744154][T14171] io_req_prep_async+0xdc/0x410 [ 1108.749003][T14171] io_submit_sqe+0x14ca/0x33a0 [ 1108.753844][T14171] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1108.759301][T14171] io_submit_sqes+0x5bd/0xbd0 [ 1108.763997][T14171] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1108.769533][T14171] ? fput+0x2d/0x130 [ 1108.773427][T14171] __x64_sys_io_uring_enter+0x74/0x80 [ 1108.778805][T14171] do_syscall_64+0x4a/0x90 [ 1108.783229][T14171] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1108.790697][T14171] RIP: 0033:0x4665d9 [ 1108.794602][T14171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.816124][T14171] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1108.824519][T14171] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1108.832473][T14171] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1108.840443][T14171] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1108.848400][T14171] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1108.856515][T14171] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000008000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x10000120}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="208cffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:04 executing program 5 (fault-call:4 fault-nth:98): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1100, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1108.896884][T14173] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1800, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1c00, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1108.966455][T14209] loop2: detected capacity change from 0 to 4 [ 1108.973045][T14210] FAULT_INJECTION: forcing a failure. [ 1108.973045][T14210] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.985695][T14210] CPU: 1 PID: 14210 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1108.994491][T14210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.004553][T14210] Call Trace: [ 1109.007835][T14210] dump_stack+0x137/0x19d [ 1109.012282][T14210] should_fail+0x23c/0x250 08:34:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xfffffff5) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x2000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1109.016718][T14210] __should_failslab+0x81/0x90 [ 1109.021502][T14210] should_failslab+0x5/0x20 [ 1109.026012][T14210] kmem_cache_alloc_bulk+0x40/0x340 [ 1109.031218][T14210] io_submit_sqes+0x4a3/0xbd0 [ 1109.035904][T14210] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1109.041380][T14210] ? fput+0x2d/0x130 [ 1109.045277][T14210] __x64_sys_io_uring_enter+0x74/0x80 [ 1109.050656][T14210] do_syscall_64+0x4a/0x90 [ 1109.055077][T14210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1109.061093][T14210] RIP: 0033:0x4665d9 08:34:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x10080000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1109.064989][T14210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1109.084617][T14210] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1109.093150][T14210] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1109.101142][T14210] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1109.109208][T14210] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1109.117183][T14210] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 1109.125175][T14210] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000c0ed000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:04 executing program 5 (fault-call:4 fault-nth:99): open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x11000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1109.158251][T14229] loop0: detected capacity change from 0 to 4096 [ 1109.170881][T14229] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1109.249431][T14240] FAULT_INJECTION: forcing a failure. [ 1109.249431][T14240] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.262116][T14240] CPU: 1 PID: 14240 Comm: syz-executor.5 Not tainted 5.13.0-rc1-syzkaller #0 [ 1109.270936][T14240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.281384][T14240] Call Trace: [ 1109.284709][T14240] dump_stack+0x137/0x19d [ 1109.289063][T14240] should_fail+0x23c/0x250 [ 1109.293486][T14240] ? io_req_prep_async+0xdc/0x410 [ 1109.295897][T14247] loop0: detected capacity change from 0 to 4096 [ 1109.298573][T14240] __should_failslab+0x81/0x90 [ 1109.298600][T14240] should_failslab+0x5/0x20 [ 1109.298623][T14240] __kmalloc+0x66/0x340 [ 1109.298642][T14240] ? io_req_prep_async+0xdc/0x410 [ 1109.323524][T14240] io_req_prep_async+0xdc/0x410 [ 1109.328374][T14240] io_submit_sqe+0x14ca/0x33a0 [ 1109.333235][T14240] ? kmem_cache_alloc_bulk+0x28c/0x340 [ 1109.338692][T14240] io_submit_sqes+0x5bd/0xbd0 [ 1109.343368][T14240] __se_sys_io_uring_enter+0x1e1/0xa80 [ 1109.348956][T14240] ? fput+0x2d/0x130 [ 1109.352846][T14240] __x64_sys_io_uring_enter+0x74/0x80 [ 1109.358220][T14240] do_syscall_64+0x4a/0x90 [ 1109.362651][T14240] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1109.368563][T14240] RIP: 0033:0x4665d9 [ 1109.372449][T14240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:34:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x225c17d03) 08:34:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2097ffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x2600, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1109.392053][T14240] RSP: 002b:00007f5360dc2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1109.400466][T14240] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1109.409829][T14240] RDX: 0000000000000000 RSI: 000000000000009c RDI: 0000000000000004 [ 1109.417821][T14240] RBP: 00007f5360dc21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1109.425970][T14240] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000003 [ 1109.434029][T14240] R13: 00007ffdbbff078f R14: 00007f5360dc2300 R15: 0000000000022000 08:34:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf2710c72fa) 08:34:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x20010010}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000010001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:04 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9c, 0x0, 0x3, 0x0, 0x0) 08:34:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3305, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20daffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1109.475797][T14247] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1109.503910][T14263] loop2: detected capacity change from 0 to 4 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2000000000000) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x28000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3f00, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x3f000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2, 0x0, 0x3, 0x0, 0x0) [ 1109.652233][T14289] loop0: detected capacity change from 0 to 4096 [ 1109.667376][T14288] loop2: detected capacity change from 0 to 4 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x4000000000000) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x8004, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1109.726283][T14289] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x40000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20f6ffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x100000000000000) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xeffd, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x60000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x200000000000000) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfeff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x7f000001}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1109.913967][T14347] loop0: detected capacity change from 0 to 4096 [ 1109.927386][T14355] loop2: detected capacity change from 0 to 4 [ 1109.951303][T14347] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfffe, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20fdffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xac14140a}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x300000000000000) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x80000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x37dc12502000000) [ 1110.123137][T14396] loop0: detected capacity change from 0 to 4096 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000070001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1110.176536][T14397] loop2: detected capacity change from 0 to 4 [ 1110.188198][T14396] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xac14140b}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x80040, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20feffffff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x400000000000000) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x200000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x500000000000000) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xe0ffffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x8, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x200ac0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1110.366154][T14447] loop0: detected capacity change from 0 to 4096 [ 1110.402164][T14456] loop2: detected capacity change from 0 to 4 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xf5ffffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000001000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1110.408015][T14447] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffffffffff070001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfc000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:05 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x9, 0x0, 0x3, 0x0, 0x0) 08:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xf0ff7f, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x600000000000000) 08:34:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfe800000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xa, 0x0, 0x3, 0x0, 0x0) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1110.553679][T14488] loop2: detected capacity change from 0 to 4 [ 1110.590884][T14499] loop0: detected capacity change from 0 to 4096 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x700000000000000) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfe80ffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000080001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200002000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1110.610877][T14499] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xb, 0x0, 0x3, 0x0, 0x0) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x2000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfec0ffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x800000000000000) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x2040000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000c0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xff000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xc, 0x0, 0x3, 0x0, 0x0) [ 1110.750756][T14536] loop0: detected capacity change from 0 to 4096 [ 1110.773485][T14536] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1110.793020][T14532] loop2: detected capacity change from 0 to 4 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x900000000000000) 08:34:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200003000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffff0000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x4000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xd, 0x0, 0x3, 0x0, 0x0) [ 1110.948710][T14570] loop0: detected capacity change from 0 to 4096 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xa00000000000000) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x5000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffff80fe}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1110.989620][T14582] loop2: detected capacity change from 0 to 4 [ 1111.014662][T14570] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000100001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xb00000000000000) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xe, 0x0, 0x3, 0x0, 0x0) 08:34:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200004000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffffc0fe}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x6000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xf, 0x0, 0x3, 0x0, 0x0) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xc00000000000000) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x6040000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xd00000000000000) [ 1111.198881][T14629] loop0: detected capacity change from 0 to 4096 [ 1111.232512][T14634] loop2: detected capacity change from 0 to 4 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x7000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000400001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x10, 0x0, 0x3, 0x0, 0x0) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffffffe0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1111.270744][T14629] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200005000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xe00000000000000) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfffffff5}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x11, 0x0, 0x3, 0x0, 0x0) 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x8000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffff00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf00000000000000) 08:34:06 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x12, 0x0, 0x3, 0x0, 0x0) [ 1111.437654][T14680] loop2: detected capacity change from 0 to 4 [ 1111.439341][T14679] loop0: detected capacity change from 0 to 4096 08:34:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x11000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffe00001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200006000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1111.517405][T14679] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x13, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1000000000000000) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x18000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x5000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1111.626329][T14718] loop2: detected capacity change from 0 to 4 08:34:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200007000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1c000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x14, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x10000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1100000000000000) [ 1111.708988][T14740] loop0: detected capacity change from 0 to 4096 08:34:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x26000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x15, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200008000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1111.786089][T14740] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1111.813542][T14753] loop2: detected capacity change from 0 to 4 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1200000000000000) 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x16, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x33050000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x100007f00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3f000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x200000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1111.969986][T14793] loop2: detected capacity change from 0 to 4 [ 1111.981930][T14798] loop0: detected capacity change from 0 to 4096 08:34:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1300000000000000) 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x17, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200009000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x40000800, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1112.032853][T14798] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x300000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x7ffff000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1400000000000000) 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x18, 0x0, 0x3, 0x0, 0x0) [ 1112.157567][T14837] loop2: detected capacity change from 0 to 4 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x80040000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x500000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000a000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1500000000000000) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x600000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1112.221583][T14849] loop0: detected capacity change from 0 to 4096 [ 1112.247003][T14849] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x19, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xc00a2000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1112.337043][T14875] loop2: detected capacity change from 0 to 4 08:34:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000b000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x700000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1112.394951][T14890] loop0: detected capacity change from 0 to 4096 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1a, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x800000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1600000000000000) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xeffdffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1112.436653][T14890] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1112.448512][T14899] loop2: detected capacity change from 0 to 4 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xa1414ac00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000301000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:07 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1b, 0x0, 0x3, 0x0, 0x0) 08:34:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xb00000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000c000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfeffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1700000000000000) 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xb1414ac00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfffffdef, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1c, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1800000000000000) 08:34:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000d000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1112.638242][T14934] loop2: detected capacity change from 0 to 4 [ 1112.675609][T14940] loop0: detected capacity change from 0 to 4096 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xf00000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1112.707604][T14940] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1d, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1900000000000000) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfffffffe, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1112.774245][T14962] loop2: detected capacity change from 0 to 4 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x1000000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1e, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x10000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1a00000000000000) 08:34:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000e000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1112.896053][T14985] loop0: detected capacity change from 0 to 4096 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x1008000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x21, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x80000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1112.940159][T14985] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1112.965566][T15008] loop2: detected capacity change from 0 to 4 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1b00000000000000) 08:34:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000f000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x22, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x7ffffffff000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x2001001000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1c00000000000000) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x23, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1113.121873][T15038] loop0: detected capacity change from 0 to 4096 [ 1113.131400][T15039] loop2: detected capacity change from 0 to 4 [ 1113.160921][T15038] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x7ffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x2800000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200010000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x20000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x24, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x3f00000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1d00000000000000) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xf0ff7f00000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1e00000000000000) 08:34:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1113.348077][T15085] loop2: detected capacity change from 0 to 4 [ 1113.356267][T15083] loop0: detected capacity change from 0 to 4096 [ 1113.373503][T15083] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x4000000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x25, 0x0, 0x3, 0x0, 0x0) 08:34:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200011000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xf0ffffff7f0000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x1f00000000000000) 08:34:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x6000000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:08 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x26, 0x0, 0x3, 0x0, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x100000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2000000000000000) [ 1113.559210][T15128] loop0: detected capacity change from 0 to 4096 [ 1113.561707][T15131] loop2: detected capacity change from 0 to 4 08:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200012000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x27, 0x0, 0x3, 0x0, 0x0) [ 1113.613845][T15128] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x8000000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x200000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xe0ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2100000000000000) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xf5ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x28, 0x0, 0x3, 0x0, 0x0) [ 1113.758366][T15173] loop2: detected capacity change from 0 to 4 08:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200022000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x204000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfc00000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1113.822026][T15184] loop0: detected capacity change from 0 to 4096 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfe80000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1113.889946][T15184] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2200000000000000) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x29, 0x0, 0x3, 0x0, 0x0) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfe80ffff00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a, 0x0, 0x3, 0x0, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x400000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1113.933438][T15207] loop2: detected capacity change from 0 to 4 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2300000000000000) 08:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200025000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2b, 0x0, 0x3, 0x0, 0x0) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xfec0ffff00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x2400000000000000) 08:34:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000020801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x500000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xeffdffff00000000) [ 1114.103422][T15247] loop0: detected capacity change from 0 to 4096 [ 1114.120926][T15254] loop2: detected capacity change from 0 to 4 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xff00000000000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x600000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2c, 0x0, 0x3, 0x0, 0x0) 08:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20002e000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2d, 0x0, 0x3, 0x0, 0x0) [ 1114.237112][T15276] loop0: detected capacity change from 0 to 4096 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xf5ffffff00000000) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x604000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1114.358175][T15302] loop2: detected capacity change from 0 to 4 08:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200048000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0xfa720c71f2000000) 08:34:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1114.403013][T15313] loop0: detected capacity change from 0 to 4096 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2e, 0x0, 0x3, 0x0, 0x0) 08:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x700000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:09 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2f, 0x0, 0x3, 0x0, 0x0) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1114.535897][T15338] loop2: detected capacity change from 0 to 4 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x800000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20004c000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x30, 0x0, 0x3, 0x0, 0x0) 08:34:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000b01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1114.616149][T15354] loop0: detected capacity change from 0 to 4096 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1100000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x31, 0x0, 0x3, 0x0, 0x0) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1114.761100][T15385] loop0: detected capacity change from 0 to 4096 [ 1114.762556][T15377] loop2: detected capacity change from 0 to 4 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1800000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz0', "3262a58ee8106810df5b53f86e061de6d79466f7cb30c9d30a6894103392d20e48cc9cbfee3491be82ba5fba3b39bba547a15e9627810fedc8aec1e5135ae8459db695df8e40ea55cd91908246aafa2e7b60789850b1df44ad60f69eefec76c335c20d33e685abbc62dce852f42e60b9e1afc2f8d6830994fb76cb2d9d3a9cca8075ecb9230adb1d12b2c73f3764ebb18b334d139c88b33bf3a164e2f6a5dbabffb13258ed3af31d64f2ab9d3f12d3fdd488f7bd7a4d317dddc979345b9c213ece1c4eade647c85f876a363bf3be08fd8c94ddd591d90cda083044b9214db231ae9ff6943de03234099dc6bb0b"}, 0xf1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x204, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7}}}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_TX_RATES={0x178, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x9, 0x3, 0x12, 0x1, 0x60, 0x60, 0x1b, 0x18, 0x18, 0x30, 0x1b, 0xc, 0x6c, 0x18, 0x5, 0xc, 0x1b, 0x878cec399422d363, 0x1b, 0x36, 0x12, 0x1, 0x48, 0x30, 0x1]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x44, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x12, 0x1, [0xb, 0xc, 0x3, 0x52, 0x6, 0x3, 0x24, 0x36, 0x3, 0x12, 0x4, 0x2, 0x4, 0xb]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3f, 0x401, 0x7fff, 0x3, 0x40, 0x8, 0x20, 0x80]}}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x1b, 0x6, 0x4d, 0x16]}]}, @NL80211_BAND_2GHZ={0x58, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x4bbb, 0x7, 0x3ff, 0x9, 0x800, 0x4, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xe000, 0x6, 0x2, 0xffff, 0x2, 0x400, 0x6, 0x7]}}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x12, 0x9, 0x1, 0xc, 0x17, 0x6c, 0x0, 0x1, 0x2, 0x48, 0xaf8388061e81e6b5, 0x3, 0x6, 0x0, 0x3, 0x3, 0x9, 0x16, 0x0, 0xc, 0x18, 0x0, 0x5, 0x5, 0x9, 0x36]}, @NL80211_TXRATE_HT={0xc, 0x2, [{0x6, 0x5}, {0x7, 0x4}, {0x4}, {0x0, 0x7}, {0x1, 0x7}, {0x5, 0x3}, {0x1, 0x3}, {0x1, 0x5}]}]}, @NL80211_BAND_6GHZ={0x30, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x400, 0x0, 0x400, 0x4, 0x100, 0x3ff, 0x3]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x1c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0x34, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0x9, 0x1, 0x9, 0x5, 0x3, 0x9, 0x30, 0x16, 0xb]}, @NL80211_TXRATE_LEGACY={0x20, 0x1, [0x9, 0x6c, 0x18, 0x60, 0x48, 0x30, 0x18, 0x30, 0x2, 0x1b, 0x15, 0x6c, 0x2, 0x24, 0x4, 0x27, 0x18, 0xc, 0x16, 0x6, 0x6c, 0x3, 0x1, 0x48, 0x18, 0x9, 0x30, 0x36]}]}]}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1}, @NL80211_ATTR_MESH_SETUP={0x28, 0x70, [@NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5}, @NL80211_MESH_SETUP_USERSPACE_AMPE={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5, 0x6, 0x1}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5, 0x2, 0x1}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000840}, 0x4008000) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x28, r3, 0x2, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x9, 0x6}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r5 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x1c, r3, 0x2, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) syz_io_uring_submit(r6, r7, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r5, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200060000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x32, 0x0, 0x3, 0x0, 0x0) 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x1c00000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) syz_open_procfs(r1, &(0x7f0000000240)='io\x00') preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x10, 0x2}, &(0x7f0000214000/0x2000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140), 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x15, 0x3) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x2600000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x33, 0x0, 0x3, 0x0, 0x0) [ 1114.977154][T15420] loop0: detected capacity change from 0 to 4096 [ 1114.994770][T15421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15421 comm=syz-executor.3 [ 1115.011972][T15424] loop2: detected capacity change from 0 to 4 08:34:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000d01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200068000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 3: mmap(&(0x7f00006e9000/0x2000)=nil, 0x2000, 0x2000001, 0x13, 0xffffffffffffffff, 0x98d1d000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/75, 0x4b}, {&(0x7f0000000040)=""/45, 0x2d}], 0x2, 0x400, 0x8) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x34, 0x0, 0x3, 0x0, 0x0) 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3305000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xf}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20006c000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1115.197144][T15469] loop2: detected capacity change from 0 to 4 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x3f00000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x35, 0x0, 0x3, 0x0, 0x0) [ 1115.242986][T15472] loop0: detected capacity change from 0 to 4096 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x10}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x4000080000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1115.320184][T15498] loop2: detected capacity change from 0 to 4 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x36, 0x0, 0x3, 0x0, 0x0) 08:34:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200074000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x8004000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1115.449664][T15517] loop0: detected capacity change from 0 to 4096 08:34:10 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x37, 0x0, 0x3, 0x0, 0x0) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x28}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1115.543503][T15532] loop2: detected capacity change from 0 to 4 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xc00a200000000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000020f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1115.601132][T15541] loop0: detected capacity change from 0 to 4096 08:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20007a000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xeffdffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x60}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:11 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x38, 0x0, 0x3, 0x0, 0x0) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfc}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1115.749147][T15565] loop2: detected capacity change from 0 to 4 [ 1115.783147][T15574] loop0: detected capacity change from 0 to 4096 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfeffffff00000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000fe000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x300}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:11 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x39, 0x0, 0x3, 0x0, 0x0) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x500}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfeffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3a, 0x0, 0x3, 0x0, 0x0) [ 1115.967943][T15602] loop2: detected capacity change from 0 to 4 [ 1115.986533][T15605] loop0: detected capacity change from 0 to 4096 08:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000ee010002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x600}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:11 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3b, 0x0, 0x3, 0x0, 0x0) 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xffffffff00000000, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x700}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000021101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1116.192620][T15628] loop2: detected capacity change from 0 to 4 [ 1116.192802][T15636] loop0: detected capacity change from 0 to 4096 08:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000f6010002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x810}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xffffffffffff0700, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3c, 0x0, 0x3, 0x0, 0x0) [ 1116.323378][T15656] loop0: detected capacity change from 0 to 4096 08:34:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xf00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1116.403287][T15662] loop2: detected capacity change from 0 to 4 08:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200004020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfffffffffffffdef, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:11 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3d, 0x0, 0x3, 0x0, 0x0) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x1008}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1116.535238][T15687] loop0: detected capacity change from 0 to 4096 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xfffffffffffffffe, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3e, 0x0, 0x3, 0x0, 0x0) [ 1116.583748][T15694] loop2: detected capacity change from 0 to 4 08:34:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200009020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x41, 0x0, 0x3, 0x0, 0x0) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x2800}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x42, 0x0, 0x3, 0x0, 0x0) [ 1116.777825][T15726] loop2: detected capacity change from 0 to 4 [ 1116.795132][T15731] loop0: detected capacity change from 0 to 4096 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x3f00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02"]) 08:34:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200011020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x4000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="03"]) 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x43, 0x0, 0x3, 0x0, 0x0) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x6000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1116.984504][T15767] loop2: detected capacity change from 0 to 4 [ 1117.007138][T15769] loop0: detected capacity change from 0 to 4096 08:34:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x80fe}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="04"]) 08:34:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000030002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x44, 0x0, 0x3, 0x0, 0x0) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfc00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05"]) [ 1117.155864][T15797] loop2: detected capacity change from 0 to 4 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x45, 0x0, 0x3, 0x0, 0x0) 08:34:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200002040002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="06"]) [ 1117.244200][T15808] loop0: detected capacity change from 0 to 4096 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfe80}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x46, 0x0, 0x3, 0x0, 0x0) [ 1117.327812][T15826] loop2: detected capacity change from 0 to 4 08:34:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200006040002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\a']) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xff00}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000102001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1117.404006][T15839] loop0: detected capacity change from 0 to 4096 08:34:12 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x47, 0x0, 0x3, 0x0, 0x0) 08:34:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1117.520383][T15857] loop2: detected capacity change from 0 to 4 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x48, 0x0, 0x3, 0x0, 0x0) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\b']) [ 1117.584639][T15873] loop0: detected capacity change from 0 to 4096 08:34:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200010040002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x50000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x49, 0x0, 0x3, 0x0, 0x0) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11"]) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x100000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1117.770484][T15902] loop2: detected capacity change from 0 to 4 [ 1117.797674][T15906] loop0: detected capacity change from 0 to 4096 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4a, 0x0, 0x3, 0x0, 0x0) 08:34:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000050002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18"]) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4b, 0x0, 0x3, 0x0, 0x0) 08:34:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001140)={@ipv4={'\x00', '\xff\xff', @multicast1}}) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000001140)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, r5}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x40, 0x20, 0x4, 0x28, @mcast1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7800, 0x40, 0x3, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vxcan1\x00', 0x0}) r8 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001140)={@mcast2, 0x53, r9}) r10 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r10, 0x8918, &(0x7f0000001140)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, r11}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c040000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fbdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6c0102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000400000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000800000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="2401028040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f61646361737400000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400080000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="34a00100240001630000f28a8000000000000000000000040800"/40, @ANYRES32=0x0, @ANYBLOB="6001028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000200000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400fdffffff08000600", @ANYRES32=r9, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r11, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040003000000"], 0x41c}, 0x1, 0x0, 0x0, 0x5}, 0x2) [ 1117.985558][T15931] loop2: detected capacity change from 0 to 4 [ 1118.025043][T15935] loop0: detected capacity change from 0 to 4096 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c"]) 08:34:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000022601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000060002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4c, 0x0, 0x3, 0x0, 0x0) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='&']) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x2000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200004060002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="fe"]) [ 1118.255793][T15974] loop2: detected capacity change from 0 to 4 [ 1118.276024][T15976] loop0: detected capacity change from 0 to 4096 08:34:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000022701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4d, 0x0, 0x3, 0x0, 0x0) 08:34:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x2d97, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) r6 = syz_io_uring_setup(0x76fb, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r9}}, 0x6) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x160, 0x1, {0x3, r9}}, 0x6) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, &(0x7f0000000040)) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x3000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="04"]) 08:34:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1118.411167][T15998] loop2: detected capacity change from 0 to 4 08:34:13 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4e, 0x0, 0x3, 0x0, 0x0) [ 1118.464359][T16009] loop0: detected capacity change from 0 to 4096 08:34:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000070002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x5000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000022c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x6000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) syz_io_uring_setup(0x6a93, &(0x7f00000002c0)={0x0, 0xd6da, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f00006d3000/0x4000)=nil, &(0x7f000056a000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4f, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02"]) [ 1118.639937][T16038] loop2: detected capacity change from 0 to 4 08:34:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000090002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x7000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x4}, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000347000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x50, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="06"]) 08:34:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000022d01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1118.762054][T16065] loop0: detected capacity change from 0 to 4096 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x8000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="80"]) [ 1118.813455][T16074] loop2: detected capacity change from 0 to 4 08:34:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x10, 0x0, 0x194}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003e3000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xf000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200002090002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x51, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1118.929017][T16097] loop0: detected capacity change from 0 to 4096 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x10000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='3']) [ 1119.014939][T16111] loop2: detected capacity change from 0 to 4 08:34:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000200), &(0x7f0000000240)={'U+', 0x4}, 0x16, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x118, &(0x7f0000000140)=0x1, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r4, 0x0) io_uring_enter(r4, 0xb81, 0xb191, 0x3, &(0x7f0000000280)={[0x8]}, 0x8) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff010000008000002000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000df000000000000000000000000000000000000000000000000000000000000000000000000000000000000005600"/130], 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, &(0x7f0000000040)={'ip6gre0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x2f, 0xea, 0xfd, 0x219f, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, 0x700, 0x80, 0x5, 0x103}}) 08:34:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000a0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x52, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x10000120}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000003201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1119.082212][T16127] loop0: detected capacity change from 0 to 4096 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x10080000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1119.174667][T16147] loop2: detected capacity change from 0 to 4 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x53, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000b0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000023e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1119.252318][T16166] loop0: detected capacity change from 0 to 4096 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="04"]) 08:34:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000240), 0x0, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x6856, &(0x7f0000000180)={0x0, 0x64f4, 0x1, 0x0, 0x38f, 0x0, r0}, &(0x7f0000098000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x54, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000003f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1119.340373][T16186] loop0: detected capacity change from 0 to 4096 [ 1119.373169][T16191] loop2: detected capacity change from 0 to 4 08:34:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x230902, 0x0) pread64(r1, &(0x7f0000000340)=""/146, 0x92, 0x8749) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x6000, @fd_index=0x6, 0x9, 0x0, 0x7fff, 0x1e, 0x0, {0x2}}, 0x3) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0xc201, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r8, 0x4, &(0x7f0000000400)=r1, 0x1) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x20010010}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:14 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x55, 0x0, 0x3, 0x0, 0x0) 08:34:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x28000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000023f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1119.523020][T16218] loop2: detected capacity change from 0 to 4 [ 1119.540546][T16221] loop0: detected capacity change from 0 to 4096 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0x5, 0x3) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000d0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x3f000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x56, 0x0, 0x3, 0x0, 0x0) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x400000) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) 08:34:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1119.696009][T16254] loop2: detected capacity change from 0 to 4 [ 1119.704510][T16258] loop0: detected capacity change from 0 to 4096 08:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000e0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x57, 0x0, 0x3, 0x0, 0x0) 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x40000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) ioctl$CHAR_RAW_DISCARD(r1, 0x1277, &(0x7f0000000040)=0x100000000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/47, 0x2f}, {&(0x7f0000000480)=""/209, 0xd1}, {&(0x7f0000000580)=""/148, 0x94}, {&(0x7f0000000640)=""/88, 0x58}], 0x4, 0xfffffffb, 0x1f) r2 = syz_io_uring_setup(0x40187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@private2}}, &(0x7f0000000280)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast1, 0x4e20, 0x200, 0x4e20, 0x4b6, 0x2, 0x60, 0x20, 0x5c, 0x0, r5}, {0x20, 0x6, 0x9, 0x563, 0x1de00, 0xffffffff, 0x7, 0x5}, {0x7, 0x81, 0x1, 0x6}, 0x1f, 0x6e6bb4, 0x0, 0x0, 0x4, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d5, 0x2b}, 0x2, @in6=@loopback, 0x3506, 0x0, 0x1, 0x94, 0x7, 0x401, 0x6}}, 0xe8) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000700)='./file0\x00', 0x20800, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000740)=r1, 0x1) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000469000/0x2000)=nil, 0x2000, 0x7, 0x810, r0, 0x250d6000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000340)={0x3, 0x0, @status={[0xfffffffffffffffa, 0x0, 0x401, 0x7, 0xb, 0xfff]}, [0xc4e, 0xfffffffffffffff9, 0x4, 0x1000, 0x5, 0xe000000, 0x2, 0x1ff, 0x9, 0x7, 0x7, 0x2, 0x6, 0x209, 0x3, 0x9, 0x3f, 0x4, 0x0, 0x40, 0x7, 0x0, 0xffffffffffffff05, 0x2, 0x5, 0x0, 0x1d0, 0x1, 0x3949, 0x9, 0x5b, 0x9, 0x81, 0x40000, 0x2, 0x8, 0x7, 0x1, 0x1, 0x2, 0x81, 0x100000001, 0xdf8, 0x40, 0xbc95, 0x4, 0x0, 0x3, 0x10001, 0x0, 0x0, 0x0, 0x20, 0x4, 0x7f, 0x5, 0x8, 0x1a35, 0x1, 0x1f5021f7, 0x9, 0xb88, 0x6f, 0x3]}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x983, &(0x7f0000000180)={0x0, 0x8, 0x2, 0x1, 0x0, 0x0, r0}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000002340)={&(0x7f0000000200)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000280)="0b0b90b83da72dbad5a671afcaf41c40b945646639d42e1498c119d85533190330f886605fc699cf7f22b6739abbacc48d31d30e2e4a07057674ba135188b9a7f394461a92e7abfaa0d811784bc5b10c84fde16c7d428efb4f179053b20ab91e9b240f76073b6714ccc7420e35ed678527e7fc0934989053362c7bf744be9b269b560532e783a3001a7db7d469b465f9896eb1b975312c86e54fc514cd9f2769120598a13fe3", 0xa6}, {&(0x7f0000000d80)="dcc3d78f963e3bf2630691012ea612e643408cab0f5483e06836e2eef35e37145d93c5b0b757ce5e6fc9d90a0215d9e407fb89e61ae84f209c1837028801d162603e253fae8e6c8bee73833d030af5ee77", 0x51}, {&(0x7f0000000e00)="514b0d357ca6e02a99ce3867c973717fc9d58f120c0e4e5d9b8fcc529eafee92ea7f3cac1f600a05019aef85297bf3cd33fb2090dcd0ecdaa524a95495c4420c886adfae77868f808f91b0dd7d1dab4139062c6757b4996663a55feddb35a9c75d34cd9f7bee21f6f183a091fba8301162e7b58c4c2ba23dca4dfd7c4f7bee444a49d561ff12c3d15748be4233e2d9f8730c838a5e93c7dcc47c8801e76a740c0c47121c27b170d82cdef3d088f660ddf2627aa6e2c8235e367e614eb3850b03", 0xc0}, {&(0x7f0000000ec0)="bafe217bdf31836608f5f56789cf50930da8bf3926f862b17adf2f20b5419e4c6e6f2ddf9b7d3d44e9c7104359d4c0edb51bc714649333ee34d80ad2be4919be0cbecf887838e10469fb6776923cd26a8f589b910c8c366bd0781815d8af5902bf8706f1aeef7028e0e2ee5e9fbc1e", 0x6f}], 0x4, &(0x7f0000000f80)=[{0x100, 0x107, 0x8, "5f74ce4f968e4de9510a6ba0198bdea18c843ab70385938591b7b26c1b0bc8613fd0df1138f80ff141941e7b055e8b009ee39dee1203e128f524061b61aad4fd642a6617ae12ac8b69d79acd1f32c315a9f10ed607350e400dd85dbe32fd473462b21b0017d07825ae88be1d61135fb539bd19cc0ffe942fb267272e0a60dca86b9610fd9fb659cf5ec64b4a2890c2bbf86bc4df57b70855137084ba9384ed3a2625f5ebea12dba7bdc9f87c2e31b399d41b3b28bb1f28a310c7032294aedcdee3813dd3f24ebd06f725e385cbf7b09968fd850b21134fd0b61f4bc748a9881285e6bfb3d2c63a8a856a"}, {0xc8, 0x116, 0x0, "71896111f4c4c95530dc6bd578880b3f7b8b76d613b4f26f3a0b2d6598ede05a3d0a128aec5bff5a1888b09ef3d8927034aa65be1f5ff01a368f7c472a145ff21e47466d8dd160711ab54d1eeb1d204a0e730ee62a8f148b45dd9ea2305f4af7f47eff87308e80ee63e474cf9e14d0bd4e8dc48ecf9e893b3b4fa8886d68de8357cb6adf8854e7acf896bd26126e8ab847fe1f8a203507b92ab291ed0a524c9d4acb59969aabc3c79aa47f0705424125de697ad9ad5b2e"}, {0x60, 0x119, 0x7, "7ddab76b3952f96399a6c0a51b2d574f6d8f01cfefbbd4ab8a0fb9d046fce4b6bb711b3d758631395003b3d8206d400a438e2f023a8653bd3e1112e2d67acc5c92ff6182e71c3d2af884"}, {0x1010, 0x104, 0x4, "3108b21c411fc5a93975c15a42a0db6a47a2264744ddecaeb1abec180c928ac3cd6069567ffe43dac54221c8d03b724b55cbc0934ea554f783161f792439f55dfefa41530813ecda09fc9389e2fec0073769e0946ac7fd16ffafe186426850919c2e9a7a41860154d9ccd442e1125646820ba44604b1e7594d7a177b67bdab73a7cfed0b84965b0ab05c9dbc282715ae26516964feb0f517716afab0f757c26d3479e3f95dba28f91419485becaa88b20b1a60c434aac097c933c051c3a3883f2a56b30cc34edf7ebee83d55e49c4269f71dc53587327b50e1449b9b0f8acfe188c0afc2fc0cfc1f9cffc4f71299a29f86f419d7aa783837d8c165de3739bc2b7a634b6fdd9258104493380c504279c492549c60f91f0346e70d680f184998004dcc6e1ef7dd46ea34bdcdff68dd49aa0e95a812de928429997815e8035ac0dd0f9f9424d1167284763b88a9da362db926532b1dbede8c75e649771f00b91174f9a6a3ecc1d05feaf659eceb98cd54ac91f746222bdf79dae649007ea8a032b5369c4134c34bdbfcb93f995ec2d54b7dd418e9a258a281792bfb6b11ca0f51a5c2b2974602a0e15462685e79af7e8850ee22dcc86e2c583dcad267d51f7b7a263b4755b06cbd1829764c8b8bbba32bdd27d64f4ac9ea614e09772f3b756ebd7770b04777c6753dce9c7f8e66f4a6247ba54f5b534104123e60c2de2e72eb46fecd4de18f358f276cdf580ce3b8efa5f67d74c7e4159e37733e9ce3a59c5211687f66ff2770b2f04a42ccc3238033860e867f06bf21abb5675774c7108e97df83306252e724f0745aa466d4a7e864dca8f94cc98da8c51fdd0163622711d7c45ec2d9706c3d8387c6eba8a4babfdb23581720eee7caae7e1096e371f97e2390220cfa4dc5216eb93f1c0812d1ba1aec8780f7308fd917435e12d8b9be97b7334977156bf2b6457d8b75be854d0f8a16880ea346020d00b6e00443eea1e10010257f889d1d4e708132099e1449e876c1fd32e08d5961541666a48ec7f3496717d2ac14e2d4e125f512aba63358628b1ce4c9da144628bc8cae38962f86beb71458f48849b80d6afd2758a81dcbd9fa9e52182e11163af627f09f9fa9d086412ecf4d30818a33f51cf65b7bf1c741debb0886449c8759eb03d28edd67d2ae4f140ecf364102cb1dca52671c6cdaa9303666774939fc605d274c1c0a450ce1a590570b44bca71f00d664713970b36a8b9b56b35f3a698c40c96fd354b7bc0457dc7125853ee6c41098b3ce63e3dad7c7cd9fb7b50d2c57a59853b832f0162b7bf7fb26151b01a64b9cb99a9b8193f4c5715a9ca23229d043bb64d5eddd860720ff102fb18f08d26cebad3af02f866e35aca11cc5abc8fcc84a677c0a1dbde91a2bf89a731450a53c50d0a53dec89c994e4ebeb96b63a76639e200e16b7fd67b431df96602117e70911ef169710de044608027bd051b8e566a7c7f9bf7e3d465321d9996ddf7dd3521f9e3d2b2b6474b21f55a69c7b4a749544256d8bb66735ff562cb9cebc63fc96b9a0511c445c79d3caba5e2a898307de5c2b14454adec6f02e04b359d86f8c87c907a429edfefb869b0dcbd229d2465774140054de0c057cf41bbdb386aa1c7d8a0b3b967838f08b6563f12b445f917a78f02795747171b74afd010a9d321ccb003cb98cdad87b0723f148f0a3c4c7c6289d1dfcc3936bb92334330c0f6fad5809a60c7aa89d612a7916301d9959b6507d8191aceaadaafe58b99b6a8acc36b607676f8edbd8d7d5a1acefca03ee68e99b63a85ffc8441fcde5c0156896d7ff4ef14de9364c7887e3c3f83dd622e179eea15320538f1de146b878b19ed9f296699b1660e0867b3085053ba27c740d1eab8c32d051f75cc8b85cc6a88705c7069a7efcca1e319f352e32006cd15e51f8945f23680a302148d2cbf42a8e397ed0405b5d4321023d864424632c46f1365b47869a74efa74402a56e83e4c5d5cc8624ed08ff21c20ebc1847a605a3adf961f4f18e9a269268804993499322e107d5ccddf0c94701da2a71dc2473a06fd8f44181c47fe99bc7d0b5e2f360498c3c59d2a9ad68eb02d1e0710d7936d769bb076c7dcfac437acf43e9c9e9c6f035e6a4e044be57586c174779d0f6fa996e272ce09bf995fa40753cfd0c8c20acba93905a335fe2af3f049b3577bff338059b03a59c401bc196be8878e6cf113e6359b024b2506628ca6278bb6884d37e1ea6773ce15bc83cbf281df00eac7cf786d7d22ba5e011a8fe80ab077706220c2e7bf0e8ab505839e4bcd24327a8027e5fcef31785c89475fa7491d90a78f9360c8fe95cbfe74526f5777fa3edcb4114143658453b694d2b26e265f80fc85b997d2f10c88bc5c4659521f41ed3e491dbd377650bfa0352dffe2f953bff85f23b635eeda87e1245772360ed0abd01b20a99385594bbd4634fc944218182a025fd6de1a39b12aeeb59bb5aa1322cd8a1a1892183a82027372fd27375aa18dcae1cf95d8e23e2be15ae7f779bf759f190cdbb3ad720bc24c74381f0e77c018b965cf936f62a2c032c2be5eaa6de78a880ea22eb2bae1663faa597b96619dbf898a6d9c851984ddd1f00f36a57f4552f3d70318a06fda3da3975ca2c8238befb4cabde056198563bdfe9ed0e5e80d78c7eb8e42dcae2368496a4b26c90a64b658e356fd9ad946aa61c1383ebcb5a51cc17d33892f9747320d7dba225fc84df8037c52132d1d4880bbb3477ffaab2bea84f515073c99fb545d40604da40362f40b5e02ddc0bc42f620d8301370261201a042baa43af48f5b14357b4b9b5016dd948a330f47fdc2f20b40a93dbf980156765fbb9f41690a411c0bd686772e8e8328c5faaeb268536ca5dc99852cd18f3bc0f9f14df1a6c14bbf5178899e9681bcda200a6bf7c68f53c1e530b52a6da6f71d5229943199fc794fe2f0dd65ba447bf8fea953a47997dc2b76564eb93200392f8de8d8eb89646a5257b284ae438fb4fb89b976e7a92e749d489eaf7299ec4efa8074f7e6f94e848eb0efe8843c630cac47453f7d3572242562d533ae587655c93e18f2ffe6fe4c0ced6760c9723df253a2679bfdfdac03b6d8703c025fb315c87be9cf35e87c4a9a4a9c5130711c8d0b47ddd416c64e01d8fc8b2d71d77ee21cf15bf10e3918cb3d8080793001cea195010bb83906f304ae838cf245d92dcbefd6cd98939bb357c5beaecf9c3f9586100d31adabc9256687765df6c8646cd7a0e5fc70fe72088999a4bf93d9ebcaef5e762fe0287987e6a2328886594a669ddc84b38fc44283d587be7a73ce4397a856f43043cde3c4eb2fea989af08888cf951090c28e277c0a4f289d8ea95bc0cb1afe22c1bb2ab546c4394e2c4424e2a9c1d73c67e9f36c7ae9d568ad2733b2a6b3c914e45988ba80464d0e99556bc7ec1a4f75f7fa5f9bb2ce7ede6b954b1800e037db9e0b84c3d03d1c240cdf0fc530ca57bb080ad83b509b127b38608d4e68e0855c40e8bb4c3948391b813a3deae379998ab983392f976b23235438d58dd6c673eef5cb55e4798d76be3d2ed51d8f1ec88b3a508138008268a6ebbb93d2304741eafbb6dc1b6f0b0d3da97bc729197c25146d46a71d82a6e7c302f92a597836a3c3bd2c40682962cab82fb9ebec6b31191a69d5b8d49b1c1d7d24d77028fb270f93fb8c87358e1631fb390bd09a0e08129372add824e0f705700fc97e0bb0948fbf422ae19321e6e8aec95f399780c50c4c14677c7675983cc2edc2c5e0bccacb42332e78462e60198b931bcd2acff8dd5d457e56020963362a74539ae6c0eac4a21a70913bc62825cd979e9685478ec90fc72870ee1527f0a1d3506fc4c0ba83cda2b1394cd9983ac2edd24cdb48e8547d4239373fdbe937219fbe9e49962bbed908eef65d54fa4157d1adaf2b5715df65eedbcaa2f167f4d688b06cc8713186648838fc84eed9f3a4a84a6ea89bac301020e43226b6b9a75f6d1b9855346159fa2b3494a9f57e321535d9780d766a9295d1f6440ca6a9e344e931878d826c3cd25470c8bc831fa810c2fe043b17d1f5a8279640defa4cc5009778a157aa1b39bf3e3bd23eac5754fb39743656ac9691ffbeb4336b2dc6a67c87b52a28f5f7f4ed748def6318a721c21c382962bd407e5a0676b14eceecdb8c5ad7b37681c429212a28424231f3fbd11bfcdb697bd07b873042ed9b8aefc5b376f35f619f46b18bcaf2deb6b24f761ce5f732198597f6ebb7951eb435ae01e7e92184f38f11fd38d7cbf4b88628f8d0760b868a63e5a1b6d3678aa82cd3d8adec1cc5af0b8ef07d71729f9bdf0d8c01b697759d92c8ec8e6f60734c1f00542c043699d688210970f9db316c6fefd52999aa057bcfceec137d64632c1418a1864e0b674ed4e958876026dabe991d672073bf4e16ac4bf77722d5a8c83febc694cb56d0358359bcf15e03b2afe9078a6e7c5fa2bbd3d030a705e65854e5941b56f463cdaf8d4f594f2cff1d5ccef87ed63673a2955a0f125ec22c628b7f362545998c60248acdd47ae78dab4065ffe814982a71c17e93579bce034d233936640a9a9a088bfe0b90beb112d60e82739d8f13b08adf26ac92c5f34768534fef1264deabd8efe351da2a192fdb4c144f3a9403b64b54eb6d6e42b72dcefd1bbc536d2411f246742888bc2764a251d052a0704c82a10d3ed59db8a6e161b5c2d0ae6051265b365716968f40a8ad4ce55ac242fe5112e1bfdc9e4caa301a0c56a61075e838f49ca78ea7f40273c2b72756707334fd36be64b34f47632bc9cb268ef3f0d1df87bf4832af80af1f5a97a232906ede39fe6be1b36adcd6912a69699166f78914b5d61c2dcb5bdb9a8f4ed317aa50306d7143191fe42b46710bc406b13c6707bd00240196e266ce8ae9e5ab2847e8439ec878f68075fb11286ca68c2a00808d39811cddb85396d7a041f97a8e319d7ed0f0b521900b4e73e57e03d428ef25443ed880d71b990653e3ab80fb70b22e9c080d962f61ace1a0cb7eaa38f0db946bb62ccd18158e996bf970fff1178e6e6aff7b6e17efafb8fe14ff2d4196061764abe44153ef6067aa8498140439ed9457843fe1ce4e014d245e5ce3fbe742ac638344a2f3bc1575179fe9a1344f7787806ec2588248447a5b8d1cef8a00035c8ff9ad424c5431c0b902c6a8d9b290aa87467d198835c01ee1236c7a98f65e95a57810868ceb2463b707fd99583ebb00a28f9084a4084149c03fc6a467759ef85b98bb452d72a745522030a5e16ed2b02655d4ac6ff90e043c775328d071bc123e14d34bd1b271d4fec3d756ae16987cdf2ff455ed0e5f587d30f4278d96e526014c807d047be0374d90424cfc53fe2598e6d33390e9795b32b56e2ab720b54bbbfd2c986304dc936f4c0be3a9210474bfdd78ab6170b15c9cb81daa3656212809728b7979a7ad61cad42381a0df251ac7ee8b0aede6b454af12d8e703169dcc3f30732332a8781b7d00aa7132367c4562afd7300f62ffcda3e59d045e88bc9b9872b437800a046bdefedfec412a704fdf3107eb17ea0dd8a11ab789798813e2d0e37cd42f1ec500c78e7051d45b395de6b759cf632b37cf94d213544069b3a438962b37124cfd43bd82f6eefad7e8d2f692561ff87cb90a711bec5633d45ea390ad151ddf1f7abd24960ef55b61e09b4c3c7fb5ff3b8f4766292c40e8150e229195061183b86a3bf20c7ec83e37e61693728f999de9a626a9595448fe39ba05e3990bd5c9724f48e61c9a1a53fe08f8ea83762218"}, {0xc0, 0x110, 0xdc, "40f95563b40788fcdeb2983868f3a0f9f927ad0a84f6204648d8f7aa90046a58a06f622686ed08375a92d457b5453ad44dc6a385de8919e7fbabe3610ecbe7fc8f7df0469dfb6ac613e58e1becf7269b13e0cb272fc20280de2b20824742d4fbc3735ada7852b75c392ebcc2661c6a6610c44a22316bea5f24726c3816079de02b5a4d8b79a04f6e7d7348a3b8f13412fbeeae7f56c658d0d97181eefe3478cca3d4a3742a3c730d38c4c609c3"}, {0xb8, 0x115, 0x57a2, "ecbaf685135cc30ca0249f464e64c2857fa415b0b22119ab1ac4022a7bb9b0e53ddd3042ae4fb8bd0c442ff846d9fe36b6d1e9e15bb8467bcfd8768cbf39446b8c1010470cbecf47d58aaefeb19332a1afa62681c2a296e764c30c84b8f1053f2e1d8ff5ed79772c28eabb44b18895d44ba8b69d512bd3ff4b9fe220bda6854af40d01003700e529a76172f866f2df540566828ac5743bde60f7f99823e4bd1be43d15009926"}], 0x13b0}, 0x4) 08:34:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000024401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1119.870612][T16290] loop0: detected capacity change from 0 to 4096 [ 1119.908521][T16294] loop2: detected capacity change from 0 to 4 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x58, 0x0, 0x3, 0x0, 0x0) 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0x60000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000000f0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x410000, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'ip_vti0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x1, 0x3, 0x1000, {{0x1c, 0x4, 0x2, 0x3f, 0x70, 0x68, 0x0, 0x3f, 0x2f, 0x0, @broadcast, @loopback, {[@noop, @end, @timestamp_addr={0x44, 0x1c, 0xa2, 0x1, 0x8, [{@loopback, 0x7fffffff}, {@local, 0xbf}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}]}, @end, @timestamp_addr={0x44, 0xc, 0x34, 0x1, 0x5, [{@empty, 0x10000}]}, @noop, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x62, 0x1, 0x3, [{@local, 0x9}, {@empty, 0x11b}, {@local, 0x9}, {@loopback, 0x10000}, {@multicast1, 0x400}]}]}}}}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05"]) 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x59, 0x0, 0x3, 0x0, 0x0) 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xe0ffffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000024501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1120.063118][T16335] loop0: detected capacity change from 0 to 4096 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xf5ffffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x40) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5a, 0x0, 0x3, 0x0, 0x0) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="04"]) [ 1120.179463][T16353] loop2: detected capacity change from 0 to 4 08:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200004100002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1120.258037][T16371] loop0: detected capacity change from 0 to 4096 08:34:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000024601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5b, 0x0, 0x3, 0x0, 0x0) 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfc000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x6, &(0x7f0000000140)={0x2, 0x4, 0x0, 0x3, r4}) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="fd"]) 08:34:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200020100002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfe800000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000180)={0x0, 0xe336, 0x8, 0x2}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1120.381237][T16397] loop2: detected capacity change from 0 to 4 08:34:15 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5c, 0x0, 0x3, 0x0, 0x0) [ 1120.442282][T16408] loop0: detected capacity change from 0 to 4096 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ef"]) 08:34:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000024701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000006, 0x4010, r0, 0x0) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) syz_io_uring_submit(r4, r6, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x6adf, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0xffff7fff) 08:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff"]) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfe80ffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5d, 0x0, 0x3, 0x0, 0x0) [ 1120.562587][T16437] loop2: detected capacity change from 0 to 4 08:34:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000110002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfec0ffff}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5e, 0x0, 0x3, 0x0, 0x0) 08:34:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) fdatasync(r4) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1120.659471][T16459] loop0: detected capacity change from 0 to 4096 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="fe"]) 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xff000000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='@']) [ 1120.766173][T16472] loop2: detected capacity change from 0 to 4 [ 1120.788724][T16481] loop0: detected capacity change from 0 to 4096 08:34:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200002110002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x5f, 0x0, 0x3, 0x0, 0x0) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xffff0000}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1120.935979][T16507] loop0: detected capacity change from 0 to 4096 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x4) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xffff80fe}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000024e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x60, 0x0, 0x3, 0x0, 0x0) [ 1120.983150][T16516] loop2: detected capacity change from 0 to 4 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="c0"]) 08:34:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000120002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xffffc0fe}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f"]) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x61, 0x0, 0x3, 0x0, 0x0) 08:34:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r4) r5 = getpgid(0x0) r6 = getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="000000003000000000000000010000000100000021"], 0x68}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) r8 = accept(r0, &(0x7f0000000440)=@isdn, &(0x7f0000000280)=0x80) r9 = accept4$unix(r0, &(0x7f00000004c0), &(0x7f0000000540)=0x6e, 0x80000) r10 = memfd_create(&(0x7f0000000580)='-[]%$@\x00', 0x4) r11 = timerfd_create(0x3, 0x800) r12 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000040)="15b1c0fca6c09b5e8521dc927b1c6d3c993bc6aef0950b1acaf80183465b8c0fbd5a0a02ba87", 0x26}, {&(0x7f0000000200)="ac24aaa051dc4ac4585dac49fa5eb5ff7f1791ce0f35a208d5e3b1c85802c085b0e30d", 0x23}, {&(0x7f0000000340)="430ffa430bbc2d3782951582dcf47f757df00bf5f6b3080ed72aab20a40b6ef632ba8d498d26bb32c37e90e2e05e155c46bd2c88e794bf3ce8cea5cb7175790b7d08ef4a3c47ac30032191d8849e4b2dd54a7a0b65bbd65b03584153fa910bf2814c462e24bba23f37d053eed29ac4abb5468aa1a1c1889579ebae2ff3d03dd84335dd10e42b1e957e8ed1c7d1b3dee010b54666e6916cfaf2cd6c54c0c36abfc0aff1815cdd7e5f3256eee785aa5e0b09b8c7c8b8f8d75fe41fdee67c055225a8371b13aa0be383f1379dbcae027711165890482b76bc283579aebcc7b9c27f27013faf060cf2f3", 0xe8}], 0x3, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r4, r6}}}, @rights={{0x18, 0x1, 0x1, [r0, r1]}}, @rights={{0x2c, 0x1, 0x1, [r0, r7, r8, r9, r10, r11, r12]}}], 0x68, 0x24044005}, {&(0x7f0000000640)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000740)=[{&(0x7f00000006c0)="dc3ee6eb3140d1d4214c5c1dc21b13669f7962c1153d940561e76d32b02e4a0d72a0cd0302a47e1c1e", 0x29}, {&(0x7f0000000700)="62049f02209d", 0x6}], 0x2, 0x0, 0x0, 0x2000800}, {&(0x7f0000000780)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000800)="dacd403f5c806f981bb7071eae7edeba0f089f98d3129e616c797da6d5a9ff55e063930bd27506f4ce1f221143a7fbedecb3e7ec586104d1148276c2887a8d0e9f113b8963e5ba7a804f0a9f3751f5ab3a27b7a0271942ab1b991f08f8f472de6f32", 0x62}], 0x1, 0x0, 0x0, 0x44040}], 0x3, 0x84) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1121.172924][T16554] loop2: detected capacity change from 0 to 4 [ 1121.191948][T16556] loop0: detected capacity change from 0 to 4096 08:34:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000024f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000200002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0xd17285159a70379c}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xffffffe0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x62, 0x0, 0x3, 0x0, 0x0) 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200010200002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1121.372393][T16594] loop2: detected capacity change from 0 to 4 [ 1121.397272][T16599] loop0: detected capacity change from 0 to 4096 08:34:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1, 0x0, 0x0, 0xfffffff5}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x80000) mmap(&(0x7f0000413000/0x8000)=nil, 0x8000, 0x4, 0x13, r1, 0xee292000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x73, 0x1) write(r5, &(0x7f0000000180)="f1a16fd8e1cccb05207fe243d39f291db468187bcbb052c6671f8de25d011fed283545155f1abd916e5f2079c24a25f40f17975662e30d8ed3355445a6539dcfac6207778e08195d10187072ce2de81f5f1be7ca6c1c99456fd722be0db5bc877d638a5be6ec7ca0fe048a9e18b3b077870b41ccdc172de8cb1f3a810223c18396e26e4bdfad56a6fb72e7ddc4bf7899db84695e93f3e342b19fcb02", 0x9c) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:16 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x63, 0x0, 0x3, 0x0, 0x0) 08:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:17 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x64, 0x0, 0x3, 0x0, 0x0) 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1121.572762][T16625] loop2: detected capacity change from 0 to 4 [ 1121.611954][T16639] loop0: detected capacity change from 0 to 4096 08:34:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003d0000/0x14000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000220002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x2}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:17 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x65, 0x0, 0x3, 0x0, 0x0) 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x3}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:17 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x66, 0x0, 0x3, 0x0, 0x0) 08:34:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x4}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x2007, @fd_index=0xa, 0x9, 0x40, 0x5, 0x2, 0x0, {0x2, r4}}, 0x3) [ 1121.796874][T16678] loop0: detected capacity change from 0 to 4096 [ 1121.799900][T16675] loop2: detected capacity change from 0 to 4 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x4}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000250002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000007401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:17 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x67, 0x0, 0x3, 0x0, 0x0) [ 1121.954301][T16709] loop0: detected capacity change from 0 to 4096 08:34:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x10}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0xa2, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x17) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) r5 = gettid() tkill(r5, 0x200a2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)) 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x5}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:17 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x68, 0x0, 0x3, 0x0, 0x0) [ 1122.072684][T16729] loop2: detected capacity change from 0 to 4 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000002e0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x6}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1122.115634][T16739] loop0: detected capacity change from 0 to 4096 08:34:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000007a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:17 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x69, 0x0, 0x3, 0x0, 0x0) 08:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x7}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1122.226859][T16764] loop2: detected capacity change from 0 to 4 08:34:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000003f0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1122.341223][T16790] loop0: detected capacity change from 0 to 4096 [ 1122.407920][T16801] loop2: detected capacity change from 0 to 4 08:34:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x8}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6a, 0x0, 0x3, 0x0, 0x0) 08:34:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000007e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000400002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6b, 0x0, 0x3, 0x0, 0x0) 08:34:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xf}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x1114, 0x0, 0x0, 0x3b1, 0x0, r0}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000380), 0x141100, 0x0) dup2(r0, r4) syz_io_uring_setup(0x72c0, &(0x7f0000000180)={0x0, 0xbcf3, 0x1, 0x2, 0x184, 0x0, r0}, &(0x7f0000527000/0x2000)=nil, &(0x7f0000702000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)=0x0) r6 = syz_io_uring_setup(0x76fb, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) ioctl$MON_IOCH_MFLUSH(r9, 0x9208, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r11}}, 0x6) syz_io_uring_submit(r7, 0x0, &(0x7f0000000500)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x2007, @fd_index=0x1, 0x9, 0x0, 0x3, 0x7, 0x1, {0x3, r11}}, 0x81) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r10}}, 0x6) syz_io_uring_submit(r2, r5, &(0x7f0000000240)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x4, 0x9, 0x0, 0xffff8000, 0x0, 0x0, {0x0, r10}}, 0x100) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x10}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1125.142710][T16820] loop0: detected capacity change from 0 to 4096 [ 1125.174268][T16824] loop2: detected capacity change from 0 to 4 08:34:20 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6c, 0x0, 0x3, 0x0, 0x0) 08:34:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1125.226459][T16820] EXT4-fs mount: 44 callbacks suppressed [ 1125.226478][T16820] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000480002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x11}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffffffffffff7f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r6}, 0x0) r7 = syz_io_uring_setup(0x76fb, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r10}}, 0x6) syz_io_uring_submit(r4, r3, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1, {0x0, r10}}, 0xffffffff) r11 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r11, 0x0) setsockopt$packet_buf(r11, 0x107, 0x2, &(0x7f0000000180)="0f6b8ce0ef6e404fb892597021b16f980dcc8b953a10139d0454dc4e9b61bebd3945fc9915f31cfdee51d6c4de9a431936dc2371f716c506f8e2ecdb115750282365e73de6f8b81a7a0439745a2aae9a44263587b1a2", 0x56) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r11, 0x4, 0x40000) 08:34:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6d, 0x0, 0x3, 0x0, 0x0) 08:34:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x28}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0xfb641000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x1e46, 0x9349, 0x1, &(0x7f0000000040)={[0x1000]}, 0x8) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1125.371670][T16861] loop2: detected capacity change from 0 to 4 08:34:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000004c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x60}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:20 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6e, 0x0, 0x3, 0x0, 0x0) [ 1125.476802][T16879] loop0: detected capacity change from 0 to 4096 08:34:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(0xffffffffffffffff, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000008001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xfc}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000600002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1125.533959][T16879] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1125.570674][T16905] loop2: detected capacity change from 0 to 4 08:34:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = getpgid(0x0) r3 = getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="000000003000000000000000010000000100000021"], 0x68, 0x20000000}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0xcc, 0x41, 0x20, 0x70bd27, 0x25dfdbfd, {0x1a}, [@nested={0xb6, 0x76, 0x0, 0x1, [@generic="c44438f13314d43364b592f80265c5cad4a322e5cc7684638609eac2b54cfb15ad9df5225e794fba445f", @typed={0xc, 0x0, 0x0, 0x0, @u64=0x80000001}, @typed={0x8, 0x1, 0x0, 0x0, @pid=r2}, @generic="89d01c31ac3e69dbe11177367d6d73f87e351062bfadc7cfdb0197af25e54866c82e3e7c0532d487ebcc28b03e8ecfa1ab1ea9a61b8dbcf889dcf2f0c0b1b80ada8be9c39ebe57d52a8562ad85d433778f26896402f96b60906448d0709c82a4254bb077865a6f735955b84fa8d175af92526d53"]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) close(r1) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) r5 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r5, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:21 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6f, 0x0, 0x3, 0x0, 0x0) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x300}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1125.706922][T16934] loop0: detected capacity change from 0 to 4096 [ 1125.708714][T16931] loop2: detected capacity change from 0 to 4 08:34:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x1f4, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfd75}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x35}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MEDIA={0xac, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x12000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7aaa}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000680002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x500}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x70, 0x0, 0x3, 0x0, 0x0) [ 1125.773669][T16934] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x600}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x73a3, &(0x7f0000000180)={0x0, 0xbc4a, 0x2, 0x1, 0x1e4, 0x0, r0}, &(0x7f00005dc000/0x5000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r4, 0x0, &(0x7f0000000240)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x2) [ 1125.898578][T16966] loop0: detected capacity change from 0 to 4096 [ 1125.900720][T16971] loop2: detected capacity change from 0 to 4 08:34:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000006c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x71, 0x0, 0x3, 0x0, 0x0) 08:34:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x700}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1125.945734][T16966] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1126.031320][T10025] ================================================================== [ 1126.039423][T10025] BUG: KCSAN: data-race in __wb_update_bandwidth / percpu_counter_add_batch [ 1126.048076][T10025] [ 1126.050375][T10025] write to 0xffff88810253d540 of 8 bytes by task 15186 on cpu 0: [ 1126.058062][T10025] percpu_counter_add_batch+0x9c/0xd0 [ 1126.063412][T10025] test_clear_page_writeback+0x34d/0x560 [ 1126.069060][T10025] end_page_writeback+0xd7/0x1b0 [ 1126.074000][T10025] ext4_finish_bio+0x3e2/0x430 [ 1126.078740][T10025] ext4_release_io_end+0x98/0x200 [ 1126.083755][T10025] ext4_end_io_rsv_work+0x306/0x360 [ 1126.088927][T10025] process_one_work+0x3e9/0x8f0 [ 1126.093758][T10025] worker_thread+0x636/0xae0 [ 1126.098328][T10025] kthread+0x1d0/0x1f0 [ 1126.102374][T10025] ret_from_fork+0x1f/0x30 [ 1126.106791][T10025] [ 1126.109108][T10025] read to 0xffff88810253d540 of 8 bytes by task 10025 on cpu 1: [ 1126.116734][T10025] __wb_update_bandwidth+0x9f/0x480 [ 1126.121927][T10025] wb_update_bandwidth+0x4e/0x70 [ 1126.126856][T10025] wb_writeback+0x421/0x700 [ 1126.131353][T10025] wb_do_writeback+0x461/0x510 [ 1126.136103][T10025] wb_workfn+0xc8/0x520 [ 1126.140243][T10025] process_one_work+0x3e9/0x8f0 [ 1126.145084][T10025] worker_thread+0x636/0xae0 [ 1126.149665][T10025] kthread+0x1d0/0x1f0 [ 1126.153711][T10025] ret_from_fork+0x1f/0x30 [ 1126.158112][T10025] [ 1126.160424][T10025] Reported by Kernel Concurrency Sanitizer on: [ 1126.166555][T10025] CPU: 1 PID: 10025 Comm: kworker/u4:5 Not tainted 5.13.0-rc1-syzkaller #0 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x810}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index=0x2, 0x0, 0x0, 0x8, 0x4, 0x0, {0x0, 0x0, r0}}, 0x73bad7de) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:21 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x72, 0x0, 0x3, 0x0, 0x0) 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000740002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1126.175146][T10025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.185180][T10025] Workqueue: writeback wb_workfn (flush-8:0) [ 1126.191159][T10025] ================================================================== [ 1126.207069][T16999] loop2: detected capacity change from 0 to 4 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xf00}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1126.259318][T17010] loop0: detected capacity change from 0 to 4096 [ 1126.292003][T17010] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:21 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x73, 0x0, 0x3, 0x0, 0x0) 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff"]) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x1008}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x380000e, 0x100010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r6, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8800}, 0x14000000) dup2(r4, r5) close(r1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1126.325843][T17030] loop2: detected capacity change from 0 to 4 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff"]) 08:34:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000007a0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x1100}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ef"]) 08:34:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x2800}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:21 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x74, 0x0, 0x3, 0x0, 0x0) 08:34:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000b, 0x28331, r0, 0x0) preadv(r0, &(0x7f0000005900)=[{&(0x7f0000005c40)=""/4106, 0x100a}, {&(0x7f0000005ac0)=""/161, 0xa1}, {&(0x7f0000005800)=""/218, 0xfffffffffffffdbc}], 0x3, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x34a03, 0x0) r5 = dup3(r4, r4, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000005c00)) preadv(r4, &(0x7f0000000280)=[{&(0x7f0000000180)=""/35, 0x23}, {&(0x7f00000001c0)=""/140, 0x8c}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x3, 0x7, 0x8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000005980)) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) preadv(r4, &(0x7f0000004680)=[{&(0x7f0000001340)=""/58, 0x3a}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/82, 0x52}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000003400)=""/59, 0x3b}, {&(0x7f0000003440)=""/4096, 0x1000}, {&(0x7f0000004440)=""/139, 0x8b}, {&(0x7f0000004500)=""/54, 0x36}, {&(0x7f0000004540)=""/97, 0x61}, {&(0x7f00000045c0)=""/162, 0xa2}], 0xa, 0x4, 0xffffffff) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000005a80)={&(0x7f00000059c0)={0x10, 0x0, 0x0, 0x1b350611338a9e24}, 0xc, &(0x7f0000005a40)={&(0x7f0000005a00)={0x24, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x9bc1}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x14}, 0x8800) mmap(&(0x7f00001c2000/0x3000)=nil, 0x3000, 0x9, 0x2010, r6, 0x808c7000) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r9}, 0x0) syz_io_uring_submit(r7, r3, &(0x7f0000005940)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x23456}, 0xe6) 08:34:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200001ee0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1126.455913][T17063] loop0: detected capacity change from 0 to 4096 [ 1126.477289][T17071] loop2: detected capacity change from 0 to 4 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x75, 0x0, 0x3, 0x0, 0x0) [ 1126.520483][T17063] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x3f00}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffff8c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="fe"]) 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x4}, &(0x7f0000326000/0x3000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x6000, @fd_index=0x5, 0x1, 0x7cf800000000, 0x8, 0x13, 0x1, {0x3}}, 0x401) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200001f60002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x4000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1126.593087][T17098] loop2: detected capacity change from 0 to 4 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000180)=""/91) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) creat(&(0x7f0000000040)='./file0\x00', 0x88) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001b001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x6000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1126.676426][T17122] loop0: detected capacity change from 0 to 4096 [ 1126.704006][T17122] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1126.716805][T17132] loop2: detected capacity change from 0 to 4 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_setup(0x5c62, &(0x7f0000000180)={0x0, 0xb590, 0x10, 0x2, 0x1f0}, &(0x7f00007f0000/0x3000)=nil, &(0x7f00002de000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000200)) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000fffe0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x80fe}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x77, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r6}, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x50, 0xffffffffffffffff, 0x10000000) r8 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r9}, 0x0) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r12 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r12}, 0x0) syz_io_uring_submit(0x0, r11, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0x8, 0x200, 0x0, 0x5}, 0x3) syz_io_uring_submit(r4, r7, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r8, 0x0, 0x0, 0x0, {0x200}}, 0xfff) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1126.810506][T17156] loop0: detected capacity change from 0 to 4096 [ 1126.849537][T17156] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xfc00}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1126.883537][T17170] loop2: detected capacity change from 0 to 4 08:34:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001b101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x78, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x5, 0x1, 0x1) write$binfmt_script(r1, &(0x7f0000000780)={'#! ', './file0', [{}, {0x20, '\x00'}, {0x20, '/{+'}, {0x20, ':'}], 0xa, "b9d4c94fc8790b672ec75832fa425d0e85db25059bf831d18022ca709e999736fc2553dc"}, 0x38) r2 = accept(r0, &(0x7f00000007c0)=@ipx, &(0x7f0000000840)=0x80) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000001140)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, r4}) bind(r2, &(0x7f0000000880)=@can={0x1d, r4}, 0x80) r5 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x9, 0x5, &(0x7f0000000580)=[{&(0x7f00000001c0)="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", 0xff, 0x400000004}, {&(0x7f0000000340)="47d378cace747de41a4db12bc1b83ba03afa525603e2257b352758b5a88967d3c669fdef9905c8bd943fad4fdd82e368a27658e94f8e75929c1ccb37663f276031", 0x41, 0x9}, {&(0x7f0000000900)="fe625efe792b56239f892afcab947fe56608bffd3f19ce29ebdfbc959f4334ce681e095704896a217e0e7c6bfd101e312a99f2679771c36d45d4f66db9ff26f105389429a406230f65ca0d48144ee342f76fff4bd4fcc642cdc492f39e456b531f8451228c75c96bf341cb3f3b6b7ba85449aa2b560571139214faf0715c75f1901be3bfc1657870410200d26a825cb6e101cf729fc0f33c0184843d3ff48d62f11e35ce4b25994ed4a76c3f45d8807a14d78c23251395a148df", 0xba, 0x100}, {&(0x7f0000000480)="749b4e4bc07eb7fd7c3e370e5bb52d3dc02adcd804c627aa43c15917995b1191b4f043ebb3791ebae2d317e9fd738eba2c5b1e3705f5c86bd1f0f8", 0x3b, 0x7fff}, {&(0x7f00000004c0)="82fb63dc0de97af410a864b921d2638f2ee884dc82d8c612a983ad719920f0a493675e5b42613d9550f19b77b5bd764e68ddac71874f0b21a45f0887a4ea14c3a0a7c810cfa0e99e13cc051a1172a1f1b2dbceb78ab053b6c1f31d051acc68542426fed68c1b582317a97dadce7422428160b3d040a2d07450a096688f144d8e51594a06aa0d4c56a459fd7442cb6016ade2c0", 0x93, 0x3b5dc018}], 0x820081, &(0x7f0000000600)=ANY=[@ANYBLOB='umask=00000000000000000000004,dots,dots,nodots,dos1xfloppy,dots,dots,dont_appraise,measure,subj_user=\x00,defcontext=unconfined_u,uid=', @ANYRESDEC=0x0, @ANYBLOB='$fsname?\x00,obj_role=)@+:#!,\x00']) readlinkat(r5, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=""/124, 0x7c) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r6, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000fff0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff"]) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xfe80}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x79, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1127.035806][T17205] loop2: detected capacity change from 0 to 4 [ 1127.051054][T17195] loop3: detected capacity change from 0 to 191936 [ 1127.058395][T17210] loop0: detected capacity change from 0 to 4096 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xff00}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="2000feff0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001b801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) creat(&(0x7f0000000240)='./file0\x00', 0x42) r4 = accept4$unix(r0, &(0x7f0000000180), &(0x7f0000000040)=0x6e, 0x800) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r4, &(0x7f0000000200)={r0, r1, 0x2}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r5 = gettid() process_vm_writev(r5, &(0x7f0000002640)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/80, 0x50}, {&(0x7f00000013c0)=""/209, 0xd1}, {&(0x7f00000014c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/57, 0x39}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/143, 0x8f}], 0x7, &(0x7f0000003780)=[{&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/153, 0x99}], 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1127.097074][T17210] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7a, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x34000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x40000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_setup(0x1b8, &(0x7f0000000180)={0x0, 0x96ea, 0x4, 0x2, 0x9c, 0x0, r0}, &(0x7f0000339000/0x3000)=nil, &(0x7f000064b000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000240)=0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x10d803, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000480)=@IORING_OP_STATX={0x15, 0x5, 0x0, r4, &(0x7f00000004c0), &(0x7f0000000440)='./file0\x00', 0x80, 0x400, 0x1}, 0xcc53) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x1}, 0xffffff74) [ 1127.203146][T17243] loop2: detected capacity change from 0 to 4 [ 1127.240637][T17249] loop0: detected capacity change from 0 to 4096 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7b, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001b901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000003000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x50000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1127.256059][T17249] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000180)={0x0, 0xe8cd, 0x0, 0xfffffffc}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7c, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x100000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1127.382802][T17291] loop2: detected capacity change from 0 to 4 [ 1127.411212][T17298] loop0: detected capacity change from 0 to 4096 08:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x555e, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000340)={{r0}, "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"}) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) open_by_handle_at(r4, &(0x7f0000000040)=@shmem={0xc, 0x1, {0x4, 0x1}}, 0x800) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) io_uring_enter(r5, 0x3c4f, 0x1502, 0x0, &(0x7f0000000200)={[0x9]}, 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x900, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001ba01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1127.448871][T17298] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:22 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7d, 0x0, 0x3, 0x0, 0x0) 08:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000004000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x400300}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x1000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7e, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x2000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1127.562786][T17330] loop2: detected capacity change from 0 to 4 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x82, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000007000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x3) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_init1(0xc0800) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r4, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000040)={0x2, 0x7, 0xfffe, 0x1000, 0x200}) r5 = accept$inet(r4, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) sendmmsg(r5, &(0x7f0000002300)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000340)="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", 0x1000}], 0x1, &(0x7f0000001340)=[{0x80, 0x111, 0x5, "ba04623c7880c4572861e9c3b5f9358b3bea792fead5d1f1f57e9a8f2a14093afc29eb41b846dffe0c891a916b5dfb8b73a36ca06f2f4b499819958e5437ae2476ce96f3cb8599d566eab322de0b9a250e3c86e399631e0911fcd61a3c6c85a65f65ebaf345b44c29b"}, {0x18, 0x0, 0x1f, '18F'}, {0x18, 0x118, 0x6, '-T'}, {0xc8, 0x10d, 0x0, "0fe797c4bb02acdd71aae38dc0e1051fdee09f821ba480b0f3dbc8dceb99f244c91e52b26ef59c5d9ccd943a0c1b9ca0af069ef3af1398f29e4d4ee0886d3d43c67336f68d648ed92c84787190bd7dac8003eac46df0fb6de5183f94b2801076fa403a69fa357b5a17fd48a0b292edc970744a375dea1b7d1fedea0f803614465e22677b5dad152d414482d5bc0d149621e0e3ca8eafb6fc0dee3238693983294f58255ba6e51cd4030db24796188538edeb95"}, {0x30, 0x11, 0x9, "83c2233d5f28e209e53620310015fcc0c6c2cff68cb4ed10b55dbfb0389741"}, {0x18, 0x100, 0x7fffffff, "9bb26c06cf"}, {0x28, 0x107, 0x6, "09e7d0d2b528711b9404743233cc52522c"}], 0x1e8}}, {{&(0x7f0000000240)=@caif=@dbg={0x25, 0x4, 0x7}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001540)="1508b78e0cf7f844069c4ec402ca4b5778fe810d400f9f366a96979b0e83d3dcf02d4058be3176afb1266461ba5c1e99d12d1bc63fa18763a30f", 0x3a}, {&(0x7f0000001580)="ec63fffb4848111476e5aa8b0918afa90ae26b9cb7248864e2831e3e21e95daef582047f282efe4c63981c365ce72c6dc789e2a0fbc052b2b46e1e19f63172cfb2aeda77c63fa8ddac77e1a2b10045b382e32820b7afd98da57681865624582587f9e1eb6977871fb029e5a87b8ab9f8a24d5fee465fa148a65a8cf8638b1f8266fa775961febf75c0f85b32772d1cfb8b2eb0a5b631d0a73bcf506f5759eb18e3ae03a83c87973a190c4f5cab968655de5d527fea68437ca8cab87a42c82697d7eb02905c53f8490be9bff80a71e8c2fd417d4c11dfd2ca797d9ea36c88fef95d0e0df24fe41317ded7d5ec4d9a", 0xee}, {&(0x7f0000001680)="5712cc1da834c2353078dc050c911cbb915aaefcae7772f2b06efb68cb8dbecc5e0de2890929173455c54a0d25bd2f59fdbe3379a3bd7aa9aca170f090dff90c914f99ba354a9bed139fba2a0cfac46065d63180", 0x54}, {&(0x7f0000001700)="f57be15510849600a9de3353e956fd25892c7bcc671ef0412168fc67b4692fe904a0b6bcef5059d4809ff72a8c1b0a75e9209d2fdfd875d575c23a49fec795b68f057df473c03834afa73ffa2e1e0cd40ce1d83efc06dcd3f7981de3de206b53d18a2776cbfd3e08ede6bbb6f0d29f1c7307f7e5283b68fee4a6b5fe8009eb059fe629e15c4cae5cb709ec178c1c1a", 0x8f}, {&(0x7f00000017c0)='us', 0x2}, {&(0x7f0000001800)="4681ad7a148e8e0798e0ecaa0b4ecc25ccfef9c17af81ea124dbc7dfffd33349dade3b28e481", 0x26}, {&(0x7f0000001840)="5739a4aa10d25fe449e403fa8467aec60cdd7d59009065b0320774169a1716210f795c6299d128877bb075bdb486e3cd19e01638088c9e62cce9827dda13f37c119dc4c61e8cc657e2fa37044c47c3", 0x4f}, {&(0x7f00000018c0)="1ff1e122738363a8da7b9bfa6b730a34b885e516c7fb248c04b38c3dce116c22ded8a54dff4f56851f1f598a686d0d0657f9170b463c5f5862360a507a4a24ae1e7426e690ebe3891f0539d7fbb84ced848a3f42b95fb720b9", 0x59}], 0x8, &(0x7f00000019c0)=[{0xd8, 0x10c, 0x5, "02ced2252d77f24f4658af7270e2330b4b4395fc5d215192602cde8d6c7cce14572f624e164c91dbb37534eda10216b275325331465e364267305c01653ae5087b02a2fe019059bb302b248a965a88273730bb124cc5c2c31a10b4e773366a37d04b745f4e7db1baafccd687cae95262f2af5385f66ce28f9ead1dc8ea97ca859688a3c4a2c89ec1a4efcc64d3d160f2badfb5a0250ed528ad8a7acad3b0a882e83ca933b3c4b9b681855487bd6ee03fe1718b6385c5129fc9d07fc5aba24621f8e2bf7e5649"}, {0xb8, 0xff, 0x3e, "1fd954a3255680adc0820512cfa7a23589e3ba39e070c606032ff9bce639c916dd085c37fc85e5c8baeba93083dac7b3886e3fc2a1b2b1800f01cff4f8a366f9f85e4038ecdc70e3888f4be5b8a9cd858d93c3f3d7e197de20524da5b07dbc9729916c22219dbc8cb331f37ed60d4b92163151b1b207cd8fa727ffa343d2ef36b893d1a0acccc328114dc5fe586ccded2e3b1c38cb62aa43f1113321932240bd62017b6939cb"}, {0xf8, 0x116, 0x101, "14fd05c37b48b96b950f64c97f58029ce343ec798983efa0971cac3f2ee2c337e6405d2c6251348a9c3295f266eb372d9b618bc594fedf5517221f12465688257b9be6221925331896d329c1d16e9f74053a17d158d5479c5b06e613f56323f9ec472037f34573de0ecc69b2a2d93ad62a7e09f8c9e5f7e5516c3f4ae2a4927903c7ab07ba9d4e9f01712ba867cc6614ab0dd40ed59059b44ece434f29851951e8a9a5fae2c8dd9f9a9222170230bc97e43d3dfc8fb6534638de919307db9d636867db6d8b4117f374acdd8d2e0468a9e9ffc37d5ade0d414b226a45a1c25ce60b"}, {0xc0, 0x29, 0x101, "63e98c5d6eca2c8e88d15e8d0136eb51a20b794d0d44ed40f112e0bfb8a3a506629d09404b406df4d74a1ea57b18dfcc2256042c3dff1ca5ae0e85fa1f44e46feaf50ffda804783c1739a8c10669663edb4a86ab4d1c3b916a86a93f6a8511c19adc7f925e2a85cf36ed1daf6159c04a7433413ca3fcbbc125391b6ebcf8a1f2ab034907c270cdc16e10468fb74f51ef4b0ded9be3348a7d1e6cb45431ab21bc6e08173e156774d83962f9414792238a"}, {0x70, 0x10c, 0x8, "c13994db24f5485e6df50e0026a8a24be3b16a3ac44c8b1376d1c5ad030292e54c031f175baae4e4f99a65edc136452cc023f787a540b672a76b8bb174fe69dfdd3643c6d03f9a209d1ef7a061d6ad02e666e7a3d62a3df6ad7f354f620aaf"}, {0x100, 0xaa, 0x5, "381c94eebbf3520dfc9bfe49c2e84e081685b527a5d80ac244b6fbd483538c12d19e251147c80aaebc2e286cc95528aa23a0dcc6efe418d860d126299b6f3e947d857cf07d9721a6cd89a1822d132ad8184d111685291d853fb1c5d0371afb2783b5e2e98a65eed21ff5f8ad7924a9b63c2779a94e26a9c8895d7384d77344f278459383b3253880990b51f9cc6b0963912a9b50f87535de676505bbc720a8d08719414bb51545f46c1c8159b01b1ddc9e86623df4dabd77e9fa7837b8436afaff3c5de7c0466da75f84e52e314e9fee71a7ca1eb53f998605571e2dac7993ef5558ec0946c4f2822ab44d9d7989fe"}, {0x110, 0x10c, 0x4b13, "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"}, {0xb0, 0x6, 0x400, "98c13471ffaaf93214f07c6ab2187802cc39127c6e510a8f3ae163ab664831089ff36f17cbe7128d31fd6d89eb0f8ab88bf8a1dd37c69e11706322796b68aab8cf74004811ab91f4edf2c2f481a5b6987e344b4cee79117ba92e4e618c0949b18eca01b17c616b2f4c4e097cb096f7165e488a782f22ba137c8ed10a368a0ca99d3c995912c5670edc8dad886e4e9c090e43c20c5939a2232cf1028b094441be"}, {0x10, 0x102, 0x5}], 0x688}}, {{&(0x7f0000002080)=@can, 0x80, &(0x7f0000002200)=[{&(0x7f0000002100)="8e74e744515e74ecaefcf802fc5a29dc35bbb5a934a154c224cbf2ee9809da863fad57dd6bfc8b07c235a9545132bb49927f260454b10d5d9db71a391cf420e0776a5725a17a007bf75d3b57b7a7d0481a258fecd1935852805d10ab2ee936633d9c0eefb9c79ad9bf6f749897619d82592f29530a7585fd70a225f8c635f8938c212153c575f4554faa0e22552bd5402710166a094e465368eaae8d5e3e24a826c673c0e2d21e852e74b576dc33852c4d9e9e22ef2709f7", 0xb8}, {&(0x7f00000021c0)="b60b8dc6cd985d3b187be870818de18e7e6ab059ef470bb9038c35ba0a1f9e367326e5c833674f56dadca39921d0db670e35bf3f1ce23871e81d19", 0x3b}], 0x2, &(0x7f0000002240)=[{0x90, 0x88, 0x8, "f8b2f226307647d4aebede8961348ddff9bd163e077b8b27e25b9a14ddbfc0a34731e1c64b2d860625ffa0bdc9e2c4b3e4312f226de56d3d60dc7a33166fbed3ffc9c0890151cead1dda9d6799a03906d3b004c30da1da649dd41ab8e1488632b8984591797be698a501ddb59fc7a2c377f70d6498027ab4555a1488"}], 0x90}}], 0x3, 0x4040000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x1}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000002400)) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r6, 0x5404, &(0x7f00000023c0)={0x0, 0x5, 0x1, 0xc4f, 0x14, "17e2bff9bbf62c0b08e0d5c1bf7707caad0ea5"}) [ 1127.651681][T17345] loop0: detected capacity change from 0 to 4096 08:34:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001bb01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000180)) r2 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r2, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x3000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000000000a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x83, 0x0, 0x3, 0x0, 0x0) [ 1127.692769][T17345] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1127.720632][T17365] loop2: detected capacity change from 0 to 4 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x4000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x5df1, &(0x7f0000000240)={0x0, 0xcd9a, 0x4, 0x2, 0x1e2}, &(0x7f00002bf000/0x3000)=nil, &(0x7f000033c000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000380)) syz_io_uring_submit(r4, 0x0, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x1, 0x0, 0x1}, 0x20) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r0, 0x0, &(0x7f0000000180)="610a8aa8af83a26d57ede53df292a9d87391c7e35f81c45e0a279222803487459089b0d235a1c97c0723e538f2625ee2fe071e4755b08704183afd390f27aa3a51d43ba252a3fc6f95474f5dad594502d04f6b565b1959cf0a218847efdc2098898089200e367fddd384b2ce4c92e41458f40a0d238a5bde8c0dfb7bd7614705d55326b466c82249ebff6e340690498cf1aace4d793fb6b114347b8cb55b684dd1b8fa3a8bff325a861a4aea6277b256f686ba8094e45d0929598e7b", 0xbc, 0x40000}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x84, 0x0, 0x3, 0x0, 0x0) [ 1127.808291][T17389] loop2: detected capacity change from 0 to 4 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000000002e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1127.890978][T17406] loop0: detected capacity change from 0 to 4096 [ 1127.923119][T17406] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001c001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x5000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x85, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000340)={0x0, 0xfffffff8, 0x0, 0x1}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) syz_io_uring_setup(0xe59, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r6}, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_enter(r0, 0x4feb, 0x89c5, 0x3, &(0x7f00000003c0)={[0x1]}, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r7, 0x0) syz_io_uring_setup(0x76fb, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) io_uring_setup(0x2f0d, &(0x7f00000002c0)={0x0, 0x4863, 0x2, 0x2, 0xee, 0x0, r1}) r10 = io_uring_setup(0x30c5, &(0x7f0000000440)={0x0, 0xf71e, 0x8, 0x2, 0x3a6, 0x0, r7}) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r11}}, 0x6) syz_io_uring_submit(r2, r5, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r7, &(0x7f0000000040)={0x18480, 0x0, 0x10}, &(0x7f0000000180)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r11}}, 0xffff) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1127.936656][T17424] loop2: detected capacity change from 0 to 4 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x86, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x6000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="20000000003f000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001c101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) [ 1128.042930][T17448] loop0: detected capacity change from 0 to 4096 [ 1128.055927][T17448] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x87, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x7000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x10}, &(0x7f000008d000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x100, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r0, 0x3a91, 0xe776, 0x3, &(0x7f0000000040)={[0x9]}, 0x8) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) r5 = syz_io_uring_setup(0x76fb, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000c40)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x1, 0x1}, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r8}}, 0x6) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd=r4, 0x7, 0x0, 0x8, 0x0, 0x0, {0x0, r8}}, 0x4) syz_io_uring_setup(0x2f6d, &(0x7f00000009c0)={0x0, 0xab0d, 0x1, 0x0, 0x326, 0x0, r5}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000076000/0x3000)=nil, &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) syz_io_uring_submit(r9, 0x0, &(0x7f0000000ac0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x0, {0x0, r8}}, 0x5d) writev(r1, &(0x7f0000000900)=[{&(0x7f0000000340)="476513c751113ca45a2bc0759df41718869659a69f1512fcd08cdf63458d9617b37a2f0f42ecb2e5e4ff0fb5746a82b2c7132d53684535c6a7de22f67c6edf37506731e38c8a6214c13a0c451cd392d1f493ca8eca2be3224bdeb6a26d8eea33e323822fd086ec6989f5550f72855d786a97674e2a7d6de36b448a83092ffe6ea2f3064763909514d886aa092c7aebb895eb81338dcdc23a3a8b65911d11fc", 0x9f}, {&(0x7f0000000440)="d5f762d570e17e181b2a6574e8cb1d90c0ceb8e6a8a094e90781152d7a0a1e4c8499a4d3d3cac55fb8f48c717f2c8d013cdfdc6d00ca0ba11871cfde61dcaebf33fccd2a9c224fa41b3f713e9862539ac1b898a2d352ed85ca483a04b2d744b74694f5f80e97b881b2b49803920d9b76a85128926a2052b17fde7d199a9fc115c524de0f6042503efa8bc1369ec1cdfb8e43cce67b4583ae0ea7ec42f1482e4aa08fec3e0aa08bb36f59c3866fd6fd20120662e6b62e970d179bc07f6d38c92367df3c5329cb59b0bdad6846e63e", 0xce}, {&(0x7f0000000540)="eaa9101be45736847ae3d7c18824556bc2266fab6aab7717b6fec849983cf6393cac9da008bfd158f79dca80a2316a2cc5", 0x31}, {&(0x7f0000000580)="52602dedeb25bd178664ca771ea1fbc3f01197d3f165a84f1380d0ee4ad99c782c3ee16c37d68a5957b607eb7912f6c8f9f72378da9e6ee384772d947a9f97bda6d3fef618e98da74df457983af9ec6f6ce9a2344eecc3eaf842356d14edf9d911f95ed51ebd9683ea8f6e0896c1c998fddcbfc8553567b4bfec6018f1702d19b8bd95e2d11aaea817b13ffc31ae0dcca3f98d3ac5c867a22bd838a1619fb10ad1a92527266bec124214740d6fbd9b2c6b03ec18331fc025b63c10e864179f8b10595883b58fd897f3cf22ca07f54f4ff9583913033bff5d9ab8bbbd73", 0xdd}, {&(0x7f0000000680)="ffe367ecf9e4668a889c51a8d4075c365349ce6e9324ddff9aff6edac6c60eb16143cb1775ca2f9b7536fbf9f6f18925293116cf5b7a10f0fbaae7f947a58d654de567a74676c321b9aae81f18c84680e370c9657667d4f8fb4abc4e4e09a80aa07fa22da4558a277970f860214762d2f732398f1329e5524d1bc94efb0f69ceed8504cc9ac2d58f0789020326fa969a6efa00dfeb4c37a1a1371307ad6994945e5d94b354c6b49442c02840f45e70f8245ad507b1b07b8b56d6e43bc95b4b2f1c4814cdac0361c9f6c59af03a047304f856736d622a1ec356f95a080367cc32e5edb6a0b136b2cdc12ce46111f682bfddc1d83700", 0xf5}, {&(0x7f0000000780)="58099447a81655919f3853c4d439d9c02b9547ff8a5a52a179aef20ed83bd5afb8d23ce1951212fcc106b827311a93b4fcbb12743dad7c3c496f5b66d8f5386865999edb36491a557fd9efc338a1614e7ca9dbd2a257c171bc836ae18b1d384b450f16aa458873b12c5b877f643eb16c35f284f9faebaab0", 0x78}, {&(0x7f0000000800)="9aca6fd62d58e49cbd062524b532251f25b4d0416cb71893e8eff6d359df8558f5324211e80fd8774cddc273c2d84f6738b575a58e57a8228d1aa3318e8b81d66f52c2aa390b6f55a2e08c1c17cc2250edf03f58c980ae6f1f34b6cab718be7d63b96fee5a0b2b32aedd33dd84fe572c922bf9ad0852c501f0cacc00ca0ea4b50bd519eb71ba2245d5d23e0f3a7c73a4aa52af7741299805c6f6b6e2f98a2c72188d3bdc04996337a89e3c65234a9fd51879c44d18c32de0ab9f303e7d00ae1feb47f1404af00da3768cdc388d95a1f210f6b08c2c378863", 0xd8}], 0x7) mknodat(r0, &(0x7f0000000980)='./file0\x00', 0x400, 0x0) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)=""/215, 0xd7) 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000000064000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1128.095014][T17462] loop2: detected capacity change from 0 to 4 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x88, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x8000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) [ 1128.191410][T17481] loop2: detected capacity change from 0 to 4 [ 1128.227258][T17488] loop0: detected capacity change from 0 to 4096 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open(&(0x7f0000000840)='./file0\x00', 0x2, 0x171) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x29a, &(0x7f00000002c0)={0x0, 0x8c62}, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) r4 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) r5 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000f00)=[{&(0x7f0000000880)=""/114, 0x72}, {&(0x7f0000000900)=""/152, 0x98}, {&(0x7f00000009c0)=""/222, 0xde}, {&(0x7f0000000fc0)=""/193, 0xc1}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000d40)}, {&(0x7f0000000d80)=""/77, 0x4d}, {&(0x7f0000000e00)=""/241, 0xf1}], 0x9, 0x4, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x10000, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r10 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r8, 0x660c) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f00000003c0)=[r1, r5, r6, 0xffffffffffffffff, r7, r1, r0, r0, r9, r10], 0xa) syz_io_uring_submit(r2, r3, &(0x7f0000000800)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000007c0)={&(0x7f0000000200)=@ethernet={0x0, @random}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000400)=""/141, 0x8d}, {&(0x7f00000004c0)=""/251, 0xfb}, {&(0x7f00000005c0)=""/86, 0x56}, {&(0x7f0000000100)=""/28, 0x1c}, {&(0x7f0000000640)=""/90, 0x5a}], 0x5, &(0x7f0000000740)=""/71, 0x47}, 0x0, 0x2020, 0x1, {0x2}}, 0x6) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x89, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003c101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0xf000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1128.238069][T17488] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x8a, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18}, 0x18}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x200, 0x2, 0x0, 0x6}, {0x6, 0x27, 0x3, 0x2}, {0x1, 0x40, 0x5, 0x1}]}) r3 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) syncfs(r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000340)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x3}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r5, 0x6d79, 0x0, 0x1, 0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x10000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000030002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) [ 1128.359409][T17513] loop2: detected capacity change from 0 to 4 [ 1128.396873][T17527] loop0: detected capacity change from 0 to 4096 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x8b, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x10000120}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) [ 1128.424079][T17527] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:34:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000015d101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) rename(0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x210000, 0x41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r4, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f00001f4000/0x1000)=nil, 0x1000, 0x4, 0x30, r1, 0x8000000) r6 = syz_io_uring_setup(0x76fb, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)={0x0, 0x3938700}, 0x1, 0x0, 0x0, {0x0, r9}}, 0x6) syz_io_uring_submit(r5, r3, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x1, 0x0, 0x0, {0x0, r9}}, 0xd1e) ioctl$TCSETSF2(r4, 0x402c542d, &(0x7f0000000040)={0x6, 0x8b, 0xfffffff9, 0x3, 0x2, "4a8bce4d92ab70c1645afcc04cf5b7de6d4a64", 0x3, 0x5b3c}) 08:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x10080000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:23 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x8c, 0x0, 0x3, 0x0, 0x0) 08:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0x800) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000040)={0x1, 0x200, 0x6}) creat(&(0x7f0000000180)='./file0\x00', 0x40) r1 = syz_io_uring_setup(0x18a, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 1128.526807][T17550] loop2: detected capacity change from 0 to 4 08:34:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) 08:34:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="200000040002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2", 0x61, 0x400}], 0xc040, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00']) 08:34:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="774adc96d46b99c7d7b4b8a06ab0fe35f62049662b8ada79bc6483cbffbd37a8d18739dc371e54a4", 0x28}], 0x1}, 0x11000000}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0x0, 0x5}, 0x2}, 0x1c, 0x0}}], 0x2, 0x0) 08:34:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d3000/0x4000)=nil, &(0x7f00003be000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)={0xfff, 0xffff, 0x2, 0x0, 0x0, [{{r4}, 0x1ff}, {{r0}, 0x400}]}) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)={0x0, 0x3938700}}, 0x1) io_uring_enter(r1, 0x6196, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000605000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x705ee000) 08:34:24 executing program 5: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x8d, 0x0, 0x3, 0x0, 0x0) 08:34:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001d201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e