5033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba000840024f0298e9e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) 08:57:42 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0x9, 0x8, 0xfc, 0x85, 0x0, 0x2, 0x80180, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff9, 0x2, @perf_bp={&(0x7f0000000040), 0x5}, 0x80, 0x80008, 0x0, 0x6, 0x1, 0xfffff801, 0x7, 0x0, 0x6, 0x0, 0x8}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x5) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x5, 0xff, 0x1, 0x0, 0x7fffffff, 0x10210, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f00000001c0)}, 0xd10c, 0x1f, 0x9, 0x7, 0xfffffffffffffffe, 0x6f8, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xcf7cba7ac7da6f48) 08:57:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@private2}, 0x14) 08:57:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000051) 08:57:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 08:57:42 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x3c) 08:57:42 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000002400)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 08:57:42 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000002400)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 08:57:42 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000002400)) 08:57:42 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000180)=0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fstat(r2, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10, &(0x7f0000000300)={'trans=unix,', {[{@version_u}, {@uname={'uname', 0x3d, ']#'}}, {@access_uid={'access', 0x3d, r1}}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@msize={'msize', 0x3d, 0x200}}, {@afid={'afid', 0x3d, 0x1}}], [{@euid_lt={'euid<', 0xee01}}, {@measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '+-)'}}, {@euid_lt={'euid<', r4}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:42 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:42 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000002400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 08:57:42 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000002400)) 08:57:42 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x20, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x10000}}, {@common=@cachetag={'cachetag', 0x3d, '/'}}, {@sq={'sq', 0x3d, 0x800}}, {@common=@posixacl}, {@rq={'rq', 0x3d, 0x80000000}}, {@sq={'sq', 0x3d, 0x9}}, {@timeout={'timeout', 0x3d, 0xffffffff00000000}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_gt={'uid>', 0xee01}}, {@dont_measure}, {@permit_directio}, {@fowner_lt}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '$%$-6,'}}, {@measure}]}}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000300)={0x0, @adiantum, 0x0, @desc2}) 08:57:42 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 08:57:43 executing program 5: socketpair(0x1d, 0x0, 0x0, &(0x7f0000001640)) 08:57:43 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001740)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000067c0)={0x0, 0x0, &(0x7f0000006740)=[{&(0x7f0000005380)="f9864d6e0990a0fab167174a6260236f2d2bc428aff55cbfd5e029b7eb56e75616455355d26032a181bf32ea783aab4d3753ad8fc8de21cf6e7bcba0e2a54a0fbad40d3bf0d57bf8b678a4ef6944d2a867572845943fc21a8b263c44a811cd5c94a09b7ace65b4b7e28400dcb4a7f617c8495af18b46d365376a84b10f2f4941e31c42868e730e05d93b8f4a2923193fb787f2ac77fb8769", 0x98}, {&(0x7f0000005440)="6ca16c8716f0076900316996f4fa6bb915a9ce371e2a41f2af02ffd4b153602493f67e11d0d0ae7d6d77cad1d65b8f49c91dd30a576a5a71ddd50630620a433368344a89eadfa3126dfdafda0807eda3de23a5e7bc90e6e0385f8ba5d2a1822b97578889655d0e5ede005df266d871b0e79cd46bdf18f98a21d5e9070920e4b34164249189136c15306df283839484e95a912f", 0x93}, {&(0x7f0000005540)="692630b2626fa4879e51f731361f8813ca436425ce419169a34471b0d704a36b56d1c64d1aafc230507decddf8dbc798b18c081269cf491405752c013dc98336bea451fdc5783ea5dcc3bffedade80cdfd3a46096925cf7a10c5bf7316644283f15eff79a4c5ef589f", 0x69}, {&(0x7f0000005740)="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", 0xd2d}], 0x4}, 0x0) 08:57:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = fsmount(r0, 0x1, 0xff) r2 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r2, 0x89e1, &(0x7f0000000480)={'lo\x00'}) r3 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r3, 0x89e1, &(0x7f0000000480)={'lo\x00'}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/rcupdate', 0x208902, 0x298) r5 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r5, 0x89e1, &(0x7f0000000480)={'lo\x00'}) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000100)=[r2, r3, r4, r0, r5], 0x5) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') openat(r0, &(0x7f0000000100)='./file0\x00', 0x10082, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x600241, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x2, 0x2a, 0xd, 0xfffdfffe, 0x0, 0x5, 0x6, 0x12d, 0xffffffffffffffff}}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x200000, 0x0) io_uring_enter(r3, 0xd54, 0xf263, 0x1, &(0x7f0000000300)={[0xb543]}, 0x8) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r2) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) preadv(r5, &(0x7f00000002c0), 0x0, 0x0, 0x6) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002cbd7000fcdbdf250400000005002f000100000005002a000100000008002c000200000008003a00fcffffff080017d18f70ffff"], 0x3c}, 0x1, 0x0, 0x0, 0x54}, 0x1) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r4, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x401}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000002400)) 08:57:43 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000002400)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 08:57:43 executing program 3: sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="70090000a8881f5de65540d4e19190", @ANYRES16=0x0, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x4804}, 0x20000810) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r0, &(0x7f0000000100)=@l2={0x1f, 0x0, @none}, &(0x7f0000000040)=0x80, 0x0) 08:57:43 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 0: pipe(&(0x7f0000000640)={0xffffffffffffffff}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 08:57:43 executing program 2: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) munmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000) 08:57:43 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r0, 0x89e1, &(0x7f0000000480)={'lo\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)) 08:57:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000), 0x8) 08:57:43 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/123) msgget$private(0x0, 0x400) r1 = msgget$private(0x0, 0x220) msgrcv(r1, &(0x7f0000000080)={0x0, ""/201}, 0xd1, 0x3, 0x0) msgctl$IPC_RMID(r1, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x72f5e3, 0xc5) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000168c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x1a, 0x18, 0x0, 0x4, 0x1, 0x40, 0x2, 0x124, 0xffffffffffffffff}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000005da00)={0x0, 0x0, "05de2efa029120fc7f0d8351a6105d292a4dfc1465dd1b35d70a6057dd7a4d77a1bc6d79cc41bf50f11e265e4846e247dfb785eb23899b9f545bec3f5c39ee97d15128e0f9e8fba61ee9b388b514eab948ab9e088cd59d543c60a6fcb187ea5c7215455da993c7236b90ba54d8c1f901049d90868e48a653d3e905c2701032946f22be6a96741a27893c77a7d1f87706d65bbc11994ec891f3c329bc8a9beed2620f032db90fdfdd1f7128174fcfe2f288dd018bfd55c9b2b3edddd824119cd5f69dc6e958f949789a24eb98304fc0395d37befd567edcc9de638786f37352d25bec0fb10f6cda76ae4ecba54968ae076ef4542483ed70fbcabb92d9106fdf88", "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"}) r3 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005ea00)={0x0, ""/256, 0x0}) r6 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005ec00)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r4}, {r5, r7}], 0x7, "e6c870334de6e4"}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000100)={r5, 0xa66}) 08:57:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() getpid() sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 08:57:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001740)={0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x0) 08:57:43 executing program 0: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) pread64(r0, 0x0, 0x0, 0x0) 08:57:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x40000004) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 0: timer_create(0x9, 0x0, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, r0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/148, 0x94}], 0x1, 0x8, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)=@random={'security.', 'subj_type'}) 08:57:43 executing program 2: fork() r0 = getpid() wait4(r0, 0x0, 0x0, 0x0) 08:57:43 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f00000007c0)='./file0\x00', 0x0) 08:57:43 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x180400, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_user}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@uname={'uname', 0x3d, '::\\'}}, {@debug={'debug', 0x3d, 0x8}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@cache_none}, {@cachetag={'cachetag', 0x3d, '{\''}}, {@noextend}, {@version_u}, {@nodevmap}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash}, {@hash}]}}) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x80000, 0x1ffd) ioctl$sock_SIOCGIFINDEX(r2, 0x89e1, &(0x7f0000000480)={'lo\x00'}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) 08:57:43 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x169101, 0x0) write$binfmt_script(r0, 0x0, 0x0) 08:57:43 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:57:43 executing program 2: mount$9p_tcp(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x400, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 3: r0 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r0, 0x89e1, &(0x7f0000000480)={'lo\x00'}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000040)={0x1, 0xff, 0x3}) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 08:57:43 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 08:57:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1c0000004e00000009000000000000003509ffffffffaa61eca01bd2f77057d56eb2ffff"], 0x800) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 08:57:43 executing program 2: pipe2(&(0x7f0000002dc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) flistxattr(r0, 0x0, 0x0) 08:57:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r1, 0x89e1, &(0x7f0000000480)={'lo\x00'}) sendmmsg$unix(r1, &(0x7f0000001300)=[{{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000000040)="b6a2209e35f1f5ca888923a6ba0c84ccc41ea18113d8c87409948e93cd9ff3276df61e29f8c366c387d230b8", 0x2c}, {&(0x7f0000001180)="c5bce153795ca30b872a45f2f10eafc4479c88e139200439d6f0b59949970c4070225dc7065bb360091e810bf86d89eac0a6e3ea274cff41ac5aedeb5b8b64cf104f4a8f6b4e7fec8e9364e26134540ab83cc4ca7fc321429cb4cc508d99384f4496cdd294376a2e62e2d5778e7718", 0x6f}, {&(0x7f0000001200)="aa9915226f8e06446de93f996204acaf71791d107f829c56ac3c187a0cb7fdf1aa6fc9e667a56dbd2f489ad895a861138771a8dbbb6230970b1466e2", 0x3c}, {&(0x7f0000001240)="4f042197156093b5d10946103e50757d014227332f9836cda8f494d8c95081f6", 0x20}], 0x5, 0x0, 0x0, 0x4000801}}], 0x1, 0x4080) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001340)) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 2: r0 = inotify_init() ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, 0x0) 08:57:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 08:57:43 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x200002, 0x0) fcntl$lock(r0, 0x5, 0x0) 08:57:43 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}, 0x100, 0x0, 0x2, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80840, 0x184) 08:57:43 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000100)) io_setup(0x3aa, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f00000019c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}]) 08:57:43 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) 08:57:43 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000280)=@hci, 0x80, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2}, 0x0) 08:57:43 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 08:57:43 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x40010, 0xffffffffffffffff, 0x49f43000) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0xfffffffffffffff7, 0x18000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x88004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) 08:57:43 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x0) 08:57:43 executing program 0: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x6000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 08:57:43 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x478601, 0x0) 08:57:43 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="f9", 0x1}, {&(0x7f0000000300)='\'', 0x1}], 0x2}, 0x0) 08:57:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:43 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/power_supply', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 08:57:43 executing program 0: epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, 0x0, 0x0) 08:57:43 executing program 5: io_submit(0x0, 0xfffffffffffffdf2, &(0x7f00000025c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000500)="b2d02edda5d9a10700c7969e4a550de7888a66741f32b10a523fccdfff023ea9acd6cd7fdfdca11cfb0059ec6a8bc0dfb7a94aef71cd58ba32b4669a4d936309818c8799184d85bcc06e4035a1bb318e5db7a7cc92eb4567c64001e8c4a89c4db882b5dabd240b8770c10542b3c1a230ec7ee7b471a4f6677ded0f04eb56c723a8909d826a87e4af19b73d0c3df0412e2e83557436987b513eeff5df7e157a7812e27aaf29e3ca784a9de8e55835efac95e1e13dd2c133d3f2a605305a8679fdce4c5c70931015e4a444086a8ff679d7dbe025cee1be1ff1f1c5378b18853b84d31c66bf3647a122851cf78a6f99284555b3ab90e2cad209e47ad2d1bdb51d66dab071699b675315d138cbe30592b1b357bd456d120c924072950e0d299a0eefd3a29bce8fa7d6c740a0a3bd97cfefac3c5a41a3b529e5207c0c2d7b178ea479646f14cae50531eb61e5f18fc8c6c98b3b309a97031159568f08e9dbf480062f262adeaa6ab4126ac550def8c71604d7e0b5651cfdaba1bd3a970a91d15c83b4ae36ea9f642462f80f9595e131cb75c5a5662e2cef565e1946c6ad1b2096663a799fbc74a9f9458c3bb2bdeb5dac7a27df77e5f972dc2d842335b0bf479b5dade81142d5e7162002aef641faad8ad91930ec489d04cf1ad50e57bd89f3fe4d858ff53658836ab737c271068bdeb7ed0dfd5849557e6e545e52bd5970e789ff70bb67f2243f1eeb3acb5d1adacc9daf8fa73ad52fa46107302f833ff144b0f5474ca847831f60ebe3034c705c30a61f7ac8335981eca1b9ea267b123905b7e022b4a029898ed223e233a1281fa132df7353e2cd8f2dde706abb7a22a82183487b5c6a0e4071a5185a1e25a7343102678eb98d9efedd1cbf64aa9130ddfb05bfb0aeae3544f99fc79cbe9383741d913c3a5df8265c6cbdde95ac762fe37495d4f6512dff467974121e8786fb4fd65124c3f1216c4f5fef610bcc3c9b8193faf932a99552a31d7d649e4529776481e9cb492bcfc6b479de7d9ef0bdfa2c5075ae81a9ce6eb225e97e338c4b64fa79342d7c09e5696df0febbf626b85085a1582ffff07708723948e69ffb3aa3b1a5d73594529ca5c5e572f1dde1d08d7460469b7ddb03aa6840ba46ab7537edcfe8bd87d127727729413e51dca93bd889e26c2bf2962ff390c88ec43f061d0582d22dfd35d660300c5361db085c0673e6d5bf99ba23c44c69f680f341a2875e273bd236a039a1d7204d03e58aef2c33d0cf3ff23a31555b2ea6b3e3ff054d4ec8adebb1fc0bef51ea6ddebf44a9eb0f9b03c20aa0aa72c30c619ea83f7b9e05f8aa3e211027ecc40357d2cba2277162f0cfdd814bedd0cbd6047159265caa35629897d1dae70fb1504fbe3b9e354fba48c1049d7a80166f2bd8dcd68d33869f2cf8c53a53e8d8fa5e088302c5fa39678491df6fa61bc6591367368bf6a8e4a3ae311b800f77d6707a4f66cd09d4acfaea4d03851ea695728ddb0675a0d323ca3bff3960cc6923a1af385a8f540332c1e1cd364317c65ecafa93f976144eafc7b740d079284bdf8471ff1dec17fc608eed0cd29eb89cc8846f2a3e9ca76576e04083844e40f4f9f4f1cbfdb122c5e278a2d8301a83498024f68138e7e9d75f886377eeb9ba6d8bd648d05f9d0a7b188653808d0d669c3479e0bd91c0f3e5d10bb0cee3355d837701f0ead20964ba9d46267bf3b97d7a352c36a96f2ce9c8cfa693f3366c3bd88ccea8f3c3d603b88d88316758487f881d53abef175bf931b9c4d8dafd3ffb72a773dce8b7718303626914c1ccbc8c80e81e73d31ba2894bf6893ed6b5a361c78815b802c8425733436637a92b4d2aa4c97a8ef8b30512334b107bd4194cb0ed6c4aeb6b59a4655ece501bb0adbb0a9ad8d6c698b78e1ca0672d3a15fbb24dfc30cbbaf94eef9dcc9f3568106fcf6aa05352bdbae5bce851a01234c44166f155428e6ae21c1c7e78f3eb40861f012a449f6234ab11a9265ab3b16060600241f5c1a96635d3159024afe86bcfa2e050ea611c9fd6959ea428819b59817dc2e3c6cd40cd4299991df959b8e06f689d5922d0e0f871de13aceb18c581f9b194f31e5156793a8efa1c16fb9f75d3e6709d9034bb745cd6c3dc510655351c1954536fda07c18aaf5b04e54055c89ae49eea6e35b3d47a91f7ed21085a1452e2dce37845eb76469fbdcafbaee6581b58019031925e192a5cef9e0269a5fecf7a0535395619c94d34513b62ee94d1807293cdc75d9823c842e6d8ebfdfa48e1ea01a3e29437de499a7c885607ecbe1a85a1ce13554432f084459881704d6783907f474011cea12487ef90954c8a5f37495f0c86c7cf697057bdefa2432eeb79e6eb6b4de54e9b8f3b66ad591b947f96a478c8a0bfbc3c5fabe76340eb66293b49cb2b306ed21bbdc3ac9b04b76ea72b1f355fac4a3c6b0cde40fe93d9993b64bda9925216c1acf62200d98e63bb9eb21335de734348d7b22177d17c9e5f16638da0de29667d8cd3fae13ef4d75ad5c32a7ff088e8bbc4524aa241d6f1f124abd04222626f259ea783f5b18a682fd6070b605619a47c95e673888699a142da8e8893da1dff3b51dd0160a72b8b9a0d5618fa8e528c0109e0a82e83f427c66ecec06d06743a3980da3ac6ea3b5512bc159d77828b00080af9ec24c87edf45c374bee66856290e47fb32dc78dce8a8f692d1ba2410ba9fc654299a22dca5c85e7984fa4d79d1b33bc315bd1bbef25edf9835f0854424abe6521d5707148656aa7a48f174f96b7ab68b4f48b402755376990bb36c7e822b8d007aacfe3b17eb32e892108aa23ab41f87285db8f27f191f5a66e7ed31b54b6dbda0495b8c40c41bfeb4552b9f1da97eaac7b19c80650a2fb943dd8a3f45065421729e09c09031db53850e46bdc8b5fd5deb679c9a8ed1608c482964f24368967cba2fe0ca50e929889cff7ea86f1eb623e08f9e81391615c0ff26230fd8749728a0deb1ae81c1b626ab6b69685a4d8cb83bad13c44aef61526cabdb3b280fb312d227e8f39669649ff181efc877764fa9b7b71f766538611b754e18fbb54239a3ebd1dfe282e778719807f37a2a83ecfaa664fd10707749d00c52c1aa12f47b7ea9eea919b93b40c99ad8d21a7b02f581cfa5ae0e0045712f1b1704ca3d9e6b3ad0e7ca2550ddd6061852f37d4c234f15ef0b414ac576237b489e975272a425774418fffb216a930646d135d38050daa8244da37721bf5bbf767cf5ea5c590929912bf288e78e4579856e0df91260c317cd0da3c02e375cfa88e5ba90fa33c1db9eeafb7533ca361e35da7c7bb3ef5eb97d94be4485ee9b3cbd7a72c2f046d1d79bb20c3de1507aa261de4f8a8c64489109dfd389095684e1a69bf351231ea0d65b7d8404b56e9b32958f0d4b61c6b6370784b250226c7170ff489a94440c5cc2323d50c1b840c6eaae506c1837071f3b0493fc6a7c8f3e906b2659807c336495282a5925d7df460a3e12c7fce392cfb5449329fe2b7650dd411c64d32385fce2a597248d54c3b92f16846d2dd9849a9d1748c3b3cd476fa8c13c63ae1c137879af12e7e61324efa87596186805ad673a3460d6f15a0003c8f6cb16597e66a2f8002b6129cecb3aa3b1eb76616512e45872462d68db5d27502cf1ed9024a0603dc3cb48baac6120ee0b1387f54519bae93957dc7a8f53259c06230c32c720adfe03d920fe09a1ed4f92e81a8f6c6ff1998937327247100abd80ec1d9591e086ba30139f63bae4a90aefec59bc06217c8b3ef81713d616fae35bf98151b3f8437166e84e02394bf40e6f7ef10ab3fa303d52d1bf8ad8cd00c610d25f458ccf2fc019b6417e2c33b6e9fcd48fb4cd08eca0433ceea3153932b3b51a4eef0b97a5a1dd2c87bf689015425f30e5dc49722fb399c40e8ac5b6df2f7e2e8022701228856ff62a459a45b808afb4b78e32090e1fdead23585e5df5fcfa37412a5d802c1129dd798f2d9bca9da1c9e6915c74e7729eae3a626f3ffa56bbb5b5b3ffd04db53f3d6b7e45b26440a3206e39b474b5504805160e31d0dd688da265f99a6b90ff013853fee523596b6e3cf68c82a2c9d14ba65041be646163cc87d376e9759883c47bbf1a008d898f2c8ee530f555f853c7d4d4cd9a17df32efaa7d54efc8fd1a763a6e4bde0c3430bed875354012b2c005252dd4f0d488b188e241e25184d2ccef5f0ea0db527062a4605cecaad460399fec404bd4b0145c85f026b3d26edf481dc841a412b06bc742c366b0b5c2ceac268f7da92cda00158bfac529e8a63561f1ea86c6ca8ca08d7feb46b829904d2d186b61a7d5d8d5242e093434c2969f364938d2fa38a467330fc13325bd2c3671a552dca5057d780bba069c0a1758578d09c23c8f26286f11db28e38e389a6e64fd03f038c5b55a257d07cf8b4d2cee656330ec2933217852ffa60a6ba701a5c55fd829adfee8ec5037849575f2259ac9fdadd01e0df908124f42e83989cecd0bc9f2e39b7828deb680191e0ad05692bc1e108f812fba06ea4677a0c26daab2367152b5fd9f03a93b53ca0a3c56ee10b69a26233676de241a9aa371ad51421e5c0422d156b1e510f14ec2f5edcd308e914d3e4ffb2f7ebb0449deac2cd44ff91e4034db18ba0d94c7c0c3151aa8f93335947492b6f520e86f947c04782419e48832b1755e94cb52b15fdf30d387595067e35ae98ddb8bc2d2f8bebd023dae37e37337dce7346a571d4e5db13fbc62ce139e2c1245351bc0d83b9fe2e67d460cf051184c01450558ed405c4b54a1611fdd5b28498b7e7ebd0ada349501955b4bcd1286894a86281e738a41d167ebd412cea3d9675648c8868d191d16f2eada973878380f405e084fc3c805f6e809d6830d483471294edc6881d7ef53d27f85a6dbc1341fc1510c23948dac713a2dfeaab46ec4519a20f96e18774a568dde1fc05b5dea68e29ad741f0a26e1a5b22e9c5e2d7c43cd1e33b753c7f34f2ea42c5835666210ce9120fb1abaec6329cf5d16a6f58ae80b924ef3d529f36f8552c5bba395ac249838b7ed27151d55e55fdf7e5d4e7415250b0052df711bcccdaa8e893f05324a5be3ef0e847c21e7190711cf754abb5dcee989f3199e1b40d66018b0ff4a31bd53e1f35304bd200c9cb8db2a8fddbd7de178ee593d8d9861474e5ef8e3849bcd01e6354a3ec130f69579834919405e481c1eeee5c2d35be668e942145b721807e6dd4c1d44094b5272d4a4167a1fbb4c73668ce192aebac942f83773b8111396d36dea902e588a67ba0ff6eea0a0cae5e53e2ca5f223b9817193bd3c4098c98724f830c49a69c0dbf49b278e9bd092e0975dba3ea91338ba7a329eff58fd5bb5fb4fac2f2f6569e3fc341d582a267f5a33ba419faf8224e89a047a707dcc20dac1fbdce2a911daa724e433c1154607ef8bf61af996d15c382af971b53e9f6b8980336c1f67cb907a9990a3679e02ea31fd53df9f431266e4b45df6a3a388987cd96fb2c66f15df6ceb66035c0a46935d2cb5e08a5c4c8d679eee4713adbae503673e2e196f3b7095a9bce365672923349abaa25269caad012a606cf1805cce1ccb52b460baa8be6fd23f16335e3e333c5b488959a10e0769ba4745632b9b948b60c3cc1bc598636013590a25596aa5ac4ecb59bb3dd1a1da710fb4b3bfd9096f8e57b013de9640cff03ed4ea268e3f3efbb18099a62c4b3ffa92449b161f6196e687d2a66b3962a74b07aadfd3ec446e4ae916243c9e5aa71be49e8b144d787b6f447c7ae87a49488", 0x0, 0x3, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="ae338a7c3fabfe76b1acf2ec5f8e8ddf023b8c32e4efa4a2f7590a41174ada93e70941f186397f062755", 0x0, 0x1, 0x0, 0x3}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001500)="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", 0x0, 0xd1d0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)="b7319b3d64bb2945f9c511373eae43eba275bcca0de66d11387745dbffe433525b302564d61f7b9f794e864e407e43882b50f832b3cef7235b8ef22bc22e834c737d2802215dea485dc9bf5dbf3e1c6d1a5de6295c0b2bd1c97159320a80f713e44cb7e00c07a1e43ca8c27ad726a1a2177fa9ba44dea589", 0x0, 0x22}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)="04e97cfb8d282eabcd9a233ad49bef4c2e3b28778e703310792f2b6c5dae4c14033a7513a88fc984c1bdaacd1b7978671904d4d0de9f9dd170d03ad092c412cb625586590dffaab1f01a5220449362846d8d269d4bb007c3e59a4ee4c8419c3888a5965583cac7cd8017f90ee070c8da34654418aee8860b42a63ec7e32625672c436d95059463035df5c1333e6f17a91b9ed09756f71efa758aa1f581165f4127b1b278ae4f98db473913d464659a1d062bc0e8c2dbf43780239c16324d263139d7d169ce79ed8a7e264e848f7255a490648e11cd23dac28254620b510a5c7ebe7ebd0d51ad66313cff6c85"}, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000002500)="8f4c2eb5d813eebdd7e08eda0205224aacda2536b140ecea702ebcd49e6b327e68661b735e5335e3eecb1c5bad68965d942406", 0x0, 0x4, 0x0, 0x3}]) 08:57:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r1, 0x89e1, &(0x7f0000000480)={'lo\x00'}) mount_setattr(r0, &(0x7f0000000080)='./file0\x00', 0x9100, &(0x7f00000000c0)={0x80, 0x69, 0x20000, {r0}}, 0x20) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x21e000, 0x0) close_range(r1, r2, 0x2) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x4}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x800, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:43 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x2, 0x2}) 08:57:44 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 08:57:44 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) flistxattr(r0, 0x0, 0x0) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x114}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file1\x00', 0x4f03fedf3aecd045, 0x0) 08:57:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 08:57:44 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) 08:57:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000, 0x1) 08:57:44 executing program 1: socket(0x0, 0xea084e236c05de79, 0x0) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12f}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000200)={0x0, 0x4}) 08:57:44 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) setxattr$incfs_size(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x2) 08:57:44 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000003200)='./file0\x00', &(0x7f0000004600)=ANY=[@ANYBLOB='s']) 08:57:44 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) flock(r0, 0x1) 08:57:44 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 08:57:44 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) 08:57:44 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 08:57:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x89e1, &(0x7f0000000480)={'lo\x00'}) r1 = open(&(0x7f0000002600)='./file0\x00', 0x0, 0x19e) r2 = socket$unix(0x1, 0x5, 0x0) r3 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r3, 0x89e1, &(0x7f0000000480)={'lo\x00'}) r4 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r4, 0x89e1, &(0x7f0000000480)={'lo\x00'}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r6, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002e40)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000002f40)=0xe8) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x5) tkill(r8, 0x3a) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) stat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000180)="4530568bda7959ba5ed7067c493229f6622c33023b2042de9409fe89df7483023e99d61159f8d2f2d4772b0581c3d33e80287ddfc32f182a03c0c67f9ce859a0f785b30ee2e2f6cd0cb251065dc51ac6f3e20c6edf8b1941f0e561685032486d705034cce64442d2b6b75f3b695c28fa1aa435d5747712bc3d05fd898aa468", 0x7f}, {&(0x7f0000000200)="a7150c6e5b2d40efd63b2e24f428c27f2f2993935853ab6df33e73700cede6936a484e633cd930599227243fa5e1017e6e127688639bd4cd014c9d0c8f15299b0871f5a167dc18148f1189d123e80adb496599968097f47507ca1bf11e98ab8f9b1e0d5e5fabb34b17f2f061c446741a0f34819f846557dd9ca96650f7e10cc03ac1f108bed7ffe659cdc42cb59044e7c458edcea55c04acdbc562dbf95639bf", 0xa0}], 0x2, &(0x7f0000000300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0]}}], 0x40, 0x80}}, {{&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000003c0)="977af4f1eb3eab1bd5aeaf5be6a57439bf74120c7ff8a9ecbb6b22d5722b8cdaff148b88208f69704810f9d4c0d4ad", 0x2f}, {&(0x7f0000000400)="b6e4071ef61e8bdb5bffdeedef83c0b81358a6e7cd50c62347da7b0f625e2589361dcfda7eab29d5f7f11007edec0b3816babbc298f2ec18910afb60f72f02113d472da0ddf24c84eab5c5bf8285a98a8aa31b9f55ea7db2a37e0a57fe85afd199876ff4", 0x64}, {&(0x7f0000000480)="81c2bdbfc8bace3350d182a1719c73ef26926bc2bb2e35eaae7ff78f0d104478b25911eeaab8d75adb5f4c55f6ae081fd3e0bf788c1be2c884edee3eaf6ab56cc5d07ab625186a41b370dbbc5daf449c5a322da084faf0892fa497ec533e15c8b839631f791119cd8a619879cff41f92f3ce26dcafcdb0bf9bcc2235ee829f55d3f1437a37aae5414fabda391f8a3fd6746d2756f9435bc8891b93f7289dc051f14c09d13643d3", 0xa7}, {&(0x7f0000000540)="68e5689e7a26981a7a97", 0xa}, {&(0x7f0000000580)="b29abbdb338497e1b9804c10db01e4545a4aaa1589dc2fa5d2842330268875d4fa0f1f9853826213632310ea8a40cb407e90f0d85e32f2a4c8ce7b9efcf1c49938b41fe8b3368e0329cff4d3aafe42b60af19914748d13f79717ee0fa9460efb6c1516e30f80365761fffdfe27280393e7028a9484fc0874968c3b4dcc63bb7f0b701356188132f11fac17be69e9219ff56ef002aed82371bcd8ac448dc31318f565dbf13088d7f6e1e0", 0xaa}, {&(0x7f0000000640)="b821955f6389c5e350a18529cdf3f64c824af88ecd7986b669e3754619c341054e6521ee04d350e0b4da2806f12bb799860f4ef80b7dcec94d5424616f8ff14a8a7a01fe29c1dae81799a715c91b835b088d40ca6e7f0cc9ded3ec39c07d8769cfae4025a78ba619de9f6d9068dc33b54f3aa4c96c56290d33c8ea", 0x7b}], 0x6, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x80, 0x20000000}}, {{&(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="d3eea6c94df3c732b5c0d86f30edec31dc3d322198fc2a811e0401a4942eab3ff37cabdb0c847acccb2900ec75251e63dbaa5f78a6f9dd93e4389474dc86fe43bdb2f3989f79f36db990addb9c9204e35dd04bda60c87d8783ac9f5124f70d196a3592bb9c19954aefd3f644709f21de0a6ec678b0902f87a2c3a1111b56f1fb8686ed3bf7e4d17b49a8b835f0b2f7e70681a2a5e34ba2179519b5cf4318d760cf0a206c1eeb3dbd089d4a7d20c17ddf382470a6e0789f86936d5bea1db4f127d7cf9103da97a1bc0f8c", 0xca}, {&(0x7f0000001a00)="f871", 0x2}], 0x3, &(0x7f0000001dc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x130, 0x4000}}, {{&(0x7f0000001f00)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001f80)="ded1e89b68c5393df5d6167856689b2e68f0dfd7d0c5ac3119ab0ed33fe1d6d9ed49be1f9488bf1dd21986a1bdfba36fe6e1431f", 0x34}], 0x1, &(0x7f0000002040)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20, 0x1080}}, {{&(0x7f0000002080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000021c0)=[{&(0x7f0000002100)="5c21eba2c06afb2f67aa80a8de1e1ffbab4c2edc5888134ae3c555eb9d9e557b5845b62ff748dd4049b2f38fec8007a99bc22fe0c288151ca55dbe558972fd7fcf33615512c5d1e1c2c3600df1ccb637383f8a86cec741fca653856a23bbb73c51f5c10dfe45f6f8de378e166350bd419497481613aab4b49f67b9e595ca48108ba571ec9ad990a577dafb24c0f22fd2599738440c03573598777cc2b5f9b45e39", 0xa1}], 0x1, &(0x7f0000002240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c}}], 0x60, 0x4000001}}, {{&(0x7f00000022c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000025c0)=[{&(0x7f0000002340)="de69e9f433ebe727daf5cd5dc4da7c922e7155e0c91ff4fe4d9eaa4247c06290d460a919a7c77b1857a1e3350a77e47b8f63ed30266408c95434b42611963ee0787668df7cbeec281539e00da62c7c0e6079e1fc750571735b67d8b8dd6d985c1dc2be5bbe1f8bccc4eb0f0e5a51f73ebe6e2818a9752994a564ef9a5edae42137e5aec30efd09ffe267bc4ab3a58965b7fca72bab6bb6e0547cd4228d93baa731b645370f842fabcf9ce3e4c1aa", 0xae}, {&(0x7f0000002400)="2c9df3412c4b74f58d9fc7d970ed04330b06bfaff4d751e3f8ec22761ce48a73a92f662142520b120450b428dd4254b5684bd8ed5eeecbc48ce50ef904b5f483efc18528cdfd448450b56bdd2eaa7fba43be7624c178529086b434a03262df9e4efe8e3644fb6a3be81b70594ea5789e79dcf4318fa6770a5df9d19631cc239c98695d07332c36edffad21008d2410d77567b904ebf43a498633f8d4fbe38486c4ee66e6dbf772f1f6c2900e16f2297df3d04de53847e93b11ded110fa32", 0xbe}, {&(0x7f00000024c0)="10e4728d7447ec2da12062", 0xb}, {&(0x7f0000002500)="44f55ffba3f2016f96b230e22c73d35ba3609e520745fe9e3ac53485fba289b0e15c74e4e0ea4c4296a08fa657a3cdc0b1519e197bdcb44bfe7cbed4ec913adea8156c11e2e7c5e967c9a168f5a3f2348ca0261ee070e4ce6e71fd46cde4a3fbe94fccbd1c5952ebda22d07d90a5f23f8afb8c1bed6a3b993c66e50b0faeb725ed1dd4e10e31352840aa93fdf9140ed5ade97cd10c5ec97dd54747254d8fd39780b07a5e3a2369", 0xa7}], 0x4, &(0x7f0000002640)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r1]}}, @rights={{0x20, 0x1, 0x1, [r2, r3, r4, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, r6}}}], 0x68, 0x8}}, {{&(0x7f00000026c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002d80)=[{&(0x7f0000002740)="4675dd", 0x3}, {&(0x7f0000002780)="314508f91b5557e9da0209ba275bab489ba49403283bd567d1755a55dfd2585c2e4ab91f5199e2661c2ec2388519cb2dcc4efd0bda790061aa88e6fc10b7ce7e84df13e1d84b8adf9fdd05711afc8bd4db2f0f28846e7d846bc48ce020cf5c4a4a2346470381cfeef6141c046ab29d3b053fa230d0f7f0bee04d3ec4aacfe3cca717e189f6f50b1c1d8e98b2af7c69b1074075f6c4c1900495e0be75cc560142faa664d8b7e8e20830d242decdf206967bce15b33c33160d255a7cd6363b0e323aca8e28bdc8e0db0e2b0a3c64198d4aa6f48588168414a96123ab760c6adb85e3b6427cb9f5d45b613d14727627505b7ea8e5066095c808122c21", 0xfb}, {&(0x7f0000002880)="bf5f6e0b69506af2d3f96eb4a4cbc2966140f00d26c2dd47974c7f5d2b15a57e38f704d32493a9c7e0ee438235ce16494d715cdc8ac46102ee5febefba2be9c1355e545d1a018e207b3ff90d56ea4fb1aa250c2b33890ef6584454e78decdaa0719ae86f3bdba3a087ac39091779ed4751cd671b9164d98ee4e84c01f3b92e73f26071b6b44e27773c73c057c403b1be05cf90da09f3d6097d62c1b2fc906db8e228a0020b8a15a2bdbe", 0xaa}, {&(0x7f0000002940)="d63127111882133c73252994fc68ecf938d1dff161e75d5034dd9f4c089f529d10e2e53c0951bc0412d858709d07bccc187a99c9dbcfe046db41606f5d3852e519948e2e5efbf919b7cacd81007422ebc2a0c6705683cb519d11b03f470f40fe05167d46caa526e9a09b1adf7377f628b1c0e45b3c77ba03ad7d23d3c37ae5311237e76de5d6efc20fc0d5579f30b2", 0x8f}, {&(0x7f0000001a80)="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", 0x155}, {&(0x7f0000002b00)="a28b17344124b08195344fa6697bf5ed9e81328cca4e2e0231fd431a3291cd34e6265b3e7c126c519b186b7c049431b8dc452452e5281b21f27e1b0d906d04bee6cef17ebf0ba4362f08c63c494f7c015fe60a46ca2ef19dea91d7029676b25f9073734833", 0x65}, {&(0x7f0000002b80)="e062111c2cf7674bdb5862754098b7005ca3e59ce6ec1be0f0d13a233a0858f51cca7150af4368d3f45291a48666a549b5e22dcad897a63c04cdb3feb7fe93742d938bce307f4060329a9a5bf7f85bd977cd2d33cfd8dd638b043e20d7dccf8cac55d9b59868421e841ae1c706e49542be2b251d04854736402930dc33780bebd327cfecae5990f891cdcef9d981af533c41d2f7fa34a93e9ecceed298a508444875ce5c2d1d305cb7409cf91a7e2e013d994627ffd919fda96b9aac26942afee378d8847aa1ef0586cc3ff0cdab71674bb5d036498595a5dbc808c518557e9fec431b2dbdcfb513fee4d307fc", 0xed}, {&(0x7f0000002c80)="5c19a9615629c2f3f78798cb2b256b6958ee3e542569392c44c185ab2fa16554dca371d1f2849697fdb7163b35e3e25015099e8a9892a6c8fcfee68668022cf66bee21edd342eeaa12", 0x49}, {&(0x7f0000002d00)="5533420f5eda310d30b7caee9ba682fb84a00ad1f19ff8a24737d862f59191e5a29b7874fab3b02befc4d9f573c67e101a789b7ffc6ee5a1de724f3ec5d9ef9c47436e44e67a0c657eeda288fc6540bdd5bf36639cffb7c780d582131aff", 0x5e}], 0x9, &(0x7f0000003040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r7, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee01}}}], 0x40, 0x40000}}], 0x7, 0x10) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:44 executing program 2: io_setup(0x3aa, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 08:57:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000040)="4ec802da5db8cbff900ef95928d32887", 0x10}]) 08:57:44 executing program 5: wait4(0x0, 0x0, 0x80000000, 0x0) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15f}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x4040004, 0x0, 0x0) 08:57:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x4540, 0x29) r2 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r2, 0x89e1, &(0x7f0000000480)={'lo\x00'}) readahead(r2, 0x3, 0x8) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000000180)=""/100, 0x64}], 0x2, 0x0, 0x3) openat$incfs(r1, &(0x7f0000000200)='.log\x00', 0x10400, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x3, 0x0, 0x31, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd}, 0x82, 0x0, 0x6, 0x1, 0x0, 0x2, 0x1000, 0x0, 0x34f, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:44 executing program 0: r0 = creat(&(0x7f0000001580)='./file0\x00', 0x0) write$P9_RAUTH(r0, &(0x7f00000000c0)={0x14}, 0xfffffdba) 08:57:44 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0xf, 0x0}}], 0x1, 0x2000, 0x0) 08:57:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000555000/0x2000)=nil, 0x2000, 0x0, 0xecff3c94f9dbb2fd, 0xffffffffffffffff, 0x0) 08:57:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x6, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000640)="583b26d8b2568010368d60d2f011112aa8eade369b128d6341c12f6885a20c01c53683aa7c04ca4ebe73", 0x2a}, {&(0x7f0000000680), 0x0, 0x1000}], 0x1000, &(0x7f0000000740)=ANY=[@ANYBLOB='rodir,nnonumtail=1,nonumtail=0,uni_xlate=0,smackfsroot=(,,smackfshat=lo\x00,fsname=lo\x00,bj_user=lo\x00,\x00']) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000100)=""/250, 0xfa}, {&(0x7f0000000200)=""/246, 0xf6}, {&(0x7f0000000300)=""/165, 0xa5}, {&(0x7f00000003c0)=""/48, 0x30}, {&(0x7f00000004c0)=""/188, 0xbc}], 0x5, 0x9, 0x2) r1 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r1, 0x89e1, &(0x7f0000000480)={'lo\x00'}) io_submit(0x0, 0x1, &(0x7f0000000680)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000007c0)="e6ef90603c1f975ece63912b4c1287ad4e07b0394f072c3061247840bccb54afe809c80780bca4f4d6d6b29cdf451ca0d153c72455c8ba6fb40e6299dba0689cd1025fd62df1044fe4b86d87cc25d00e7a61d05e0c3502aff06faa2c8bf019a4cef426e91a2980ea5a00ea936e88584430ccea1e1dd28c72df10edb1cbb77dbe48be9be90517666eb679dbd27a41103d8a20f4e82fd8b888cbe6f0a5e72d51e43b805015d4fc80477a0ef6a10264cb66240b54dd8bee5fc23bd0cf74eb7ca5a986f202a61dd0e170e053f787be24708b7eab74ae9c29a209a564d7817f497a72e880ce891f000229e052dab3a5c4f1fa9afed756cc99a9349dda722a64c2c520469235805ca2c074bffba5f96ebdf10eb4bc66c14af8e68e6f30ae656a4475749a0f3a5e4ea44225c01aabf4999e4b8fb66095c82595e0504db883504b89e2c3e9bf84e4d28c20830f0b79a955945f251c4f4c23c73040d2ed8d01036e07054cfabd7afc68e4f6d5212118157542c5e3042afe20abbe5cd1e4c10a6b2d0d442c565636da873d90491624bac545057c8e137247d1f1fed538ea477f8b7f96b15e13a6773897a325d36505a291fe35831da5cecac6a58b2ecfb92c5edffa702a100a1d9805520fb1888a25a2ed944de9a40ad6a891b5c1de60246e7f69547a1de8ff2bbb0a5feb7d542a3dc7635ea7f031c9a762dab6967d0e11e4109454cf40d2ed40a975c57c27eb7ed634e34f3e89d7c54aa3912cf9e1501666a5e6581c18ba9c19b86d5448b02d2e1adf565a04b524358c01694e066701256b0558693f3a020b94966ac15fc80f502045022c0afd4b004cf9bee50c4da6930b1f191aec3b4514acaf88435f8e0f357eb94e16f6b55453aaf6ca03941457fa9962d4e1caf1aeeccd327edc4fb333a7975eeab049ad16801d7a8ca242ac445879bd9566ada24d90734875c2f54ebaf157cf4bb050a52cbfe404836d9a53154210312d8118d95211cbb7e4ef257588d0a4c0cd6853b55bddf53bb6d7de82909977d76ea5120c3162a6bfada91c3094d9ff40faaa64b8a808f314eae31874483b1be3ae91af8c2cb11abd37d636ddf71d088513f9203664dd421e3564253f62bb4e4a205ff5e810cac7f1c0610d69c2a30eed640bc9a8966511c85597f7525592059b5ea0d5779ea40415206a502f4753001eaa1d5b3ad500e3ea62036a9466e9c24aa9c5f12b44de35cd5561a6800ca138048ed70bfaef027b6ef9812aeefe3fe4e424928b6b50638e08456e46bad472a58efc732c59a70e81965714bd9f00eb2ae7a973930c97d504024c19c3c6bb50d123132ac6d3bf9cdd9710a503c73c48f25b3e53b69c9fe93ae06d68637074375b25a77047fbde7d0fec62a34bf75a4adb0feddbac800bb114cfc3f3682899b4543d1c7321a120a3aa77b1ac7e551adc598ac0915cc2cb4e802cab8e08ebd94eddade1e414cc31fa7ce162c2050696247ce78083233141817648704415adc9885e3cde6e489af2e67259a781406e8d31237741de29b1a7c2211c2740144c7c935969f9069007414607deccb6e85f412b6494737a5d2e2716aa59b0df2a55133c1ea59ae84fc9f08e81c6f94e42f69672471f5dabefc59709bbe8c34231581c181e3b3f2948afa0dc65f8564bd547e03f77fef83cae2e653ba5ec57b7dcccef21312d14b470df0ce4cfc3e758666959c76feb3dff660be86c4b65db703412fdbb01417134080af04ae004e4027cba6a0e992f077261f6e7acaf8ec9b1577f9ff1a8c5bf3788c200292ba072069fac811271eaa4ca166e3293ec1f3aa6fa384671aba53b10378882b053049946e11d2ee97f0b2ef9be67defdb260d088378dd73ae5494fd4397e0e37bd2c1f4fc6a547415fcce1f07a7afc99a62002c3b2d5488d721e22a696d1ba9bd60bff40b45d87987707faa992bdb95b033eb40394e07c4ab1778d93b1c20c6a34dfbdd51e8d1161863f0590d05f93b77f422807b8059aa560ab2b2653862ba9d11080ba9487ea22b37ddb15a0e753a4f28563a77b1c9be05d221b5376832e492608efc24b42b6b16cdaf306dfb4bd41b124248dd9720b92ccfec248fa560e63da45e7055e3251e19f26d3fd9f596d7e5225722abd502c109d96a233cc0905694207a28751576bcad9523952442098052c78ba35cc5bfc523585146a9dd50b0f2afdc53d6e378039cde9f8f1add671bc90c06cfcb65654890f277b76f59ce4ede915041c8092d7b249d224fc5445302206811f8878605a9b7e7c4003919a1da71057cc8119ccb1a11732af7f6862203bc7829a082b8eab644559eb0f76c3b7353d6601ba0a2a04f93132fbb1c4f34482b2a523d283e8156f9e65ad4e2ac345061026c469754636be1da28a55d8fa484cc5f9509406111b438bad836c1ce12e5b82be3c4b06bd48ff75d19d79829e99d8a2d6e71a185e7fd45706c342cfcf433e08ab73678470e552b229a9b20e915fc94b9d87195e7b4a701ddf4f1cac3f35d377a97148729d90a40e95d250613244aa559abe7f5340799cf7ed06a931510467c814d1209f25236c3e73847b7685415775066dfa506cf2827a3e1e01fb9d2052c175c3e9b72065eeb91699dc6cdc49947bb2c75b9b1f837f77090aadbe546f5bc37987bf34f972cc8523465671c32e0ac64bfec7b95f3e5d465343e607eb12734060c87c265a782b6f7452aa7654c06a960def3847e165e94381063530d32a02aed2f5ea78ca29743c805627c8265cec2713ea763ebdd3a8dc3f49212693961f58c53905f28da9924b86561529d53d319937c2d02b8207fa7603644e3c8e08ceb760ac06a82ac005135d9694a26286c38130b22b6c1e1546fedd50fc38393a31dacc571ba0489efeedf8f4ef0300e42759da50ec640d7eeec62ae848d3907b6bb2455c09c20af2e577ebf3e55eee92b68ceda2aa93aab8ef6a00bc7ed184e81c9c5c0ccc2ca14e92a84e3cbd5a691c7377349f803ae43102845b4a65e571458b9c1e3918b306e95cd1b05c4ece575a9cd47eae531a314ca8519a8de42c7cd359078c896dfe3a980b473e45f0bd79a7a333ad5d7ed37ae38852eaea47475b41aa7f9a2a6fcb1f94afbc677d5b7a60f63184cd5a6d4ad266a8f07c83e8c2e6cd6d43f3940342f05febda8cbeb18446cf5da2f2cd65949df1efeb3795cdd9e10a7a989af1ccfb307c382c72b429428010bb73db322feebd995e6ac1abc057e76997ea46992871a3dc32e9893229f78185002a2b605e2dbc8c2aac706510d1325c66e6952556aaad0df3bf64a36ae76d691e42995f746841de4aeb3a2dc2b4a22d9b610055261a79fd6a1914b2ca10304e34b924756a4877116b71f76ae8fd8f3d941ce97c111dca883f9756acab972a1b9a255b9d8d592da3e14ad85a8d9fd2bf22b0a59e4e793e9d8a1bd51503696dd4485f7486d9d9f1bd124a653f418edecb6818f696159f38699c9febc6562490f0bd5c47f6c68e4e9e0bb8c6153bb0eabcb9aa0b8c8f67bd9eeccb37d3f5acf1f094b942bb4e63814da53e1e72c69c97ba0fbe6b6ef4bf0cc860633ee10c21994ba08887d339ae6019bfba33a7e4fc6c83be8d68c5aafa1732d6dec1e973e7b4d490abd4bdd8e6444bb97232aa59bd8ea1dec6643052ebd64ed7b003858ee60f63f59ea96650d9b1a784f724b2e0f9ef3b207eefa0079e2847f2a782cecf253b65afcc142bc1452fbffc486a10eb044b622900114015b3e675fe6465e76ee9e2b7966e6dd6e11f9bb94f69809f803c1395cedf81645f974b121acc3dbdb97c32884b0f524f32f9312d088bd754e788528970a46b41b37b2783656086239aabab51439db877d0fad03bedf8e950acc86a1b8ddc965faacc78ab70bc1414e3930a869038595fa7c0b365f086581bff717f4af72142afba89fb8c94e4830e3040443aedbc1cea416ea3941a4b4d8628686343cb3bb2f79e58430fd626378e2145f39e078ce8d6107d61c0235261a9ab59b52117843fd800c84530264531e42fa08cec43d094c9c5f0ddc63a0f46d05f70f089fc909076618155ead3f6ac4df46009abaffcb11f8ec53886b2b3524326b78fd34ff5663d9d652262a8857a93086c8a4b8c54616f6dd23f10216fc976b9a045499d2b93c3808e2d8f78b30deb87eda531d8683ff6cda17696fe55fa00725caacde94b647969abf69c471c3ea26418d687439519d5892a8c92f55dcb6f2129e83f6e2d19ca949b8310d344a595e7d6e40541e87924b9d7705af54917a2b3b6522c3635d7a7d8e65d3e81c69c5c856d46c7a96ba81b88ab460dd6fa24c59c0e0cad53e45332897ad840340512a4abb85921a013317886edf74ec89c3c733e0c01ad491219773dcd1c4d8b5b2556559c494adb593f8d3b8116eb6e44b8f781c65a9babae3f8889d1b93e2979f053f1f8bc91128464c924c29a14a4079d914a61e4c83917c25c19a6f80e64739cc62ada8b1f7e24b23e23e2b0dbd4db30d451960d6812f185b45b442017c124f5575cc8043be74692e49c3135b1879c66ede47629c5b0c7084795f5e8683d8023ca26aec1599afe7726bf996bf3e4b12d29a7af7aff8855d52f886f9f8bf75a453a5803e07eaddb03fae93054d27a54e425d1fb6cb2e5c34dd9bc05ea8a273306d01ee63e9e3c898509a10a1366c9591a83e4d8f7b66b14ac5b97af2fac6e5c1dbe7047604f4a0b5b232c5ab5c5381d56be6d15d4e6fd3772dc45fe98670bdcb12006499291e5a272c138f0330cd4e47725c8d4e7416b1d08fa16360dabd0f253e838c5004858c79981f72c66d38977ff18bb543c87ccc57b032167d1713bdc95bfd63dffeb5521eed2d97a661b61c61c481fe0fca3a4befdb2076912d62106bf5f74dd835139a6bb4aa4380a5b2708f554c84d5201cc77bcf365f11c08a733ea5b4eee22d8c262e6960dce7b9a1c90c44a81b582114e003b158be1fb14795f45359631fb0754eac54301c880c1fbc0d1fedb9e4c7eaa419f838816c0cc86873f6b13762c441a25b91a7a329be8df2134792cc8b328e9a103efb597a65a8207fb7f9bbb603a4c85e936852442240a3acb3fe85886ce7d64d5f0bfaf6b890addb23e95511a15ce765c2bb3b5588eb0227e65d65975c9c7bc4a4aa7952fb4d37040fd920e9b90ac133991a65d44e4a5f4b7eff74473542dabfa23fbcf6c9bd99c1cabd11475dd9bfe3d01f018b6990d774fd4cbd7ea48fe6e992b9ff5c8f176861d71e5692ad7fde34b39331d55811bd9fe4025cf792e00782e441c5d7733d4175be64d84de64853041e1b60005c00f45c434bd32b75bf084be003c05dde00db856ee240dd50136013e5ff73cbdd0efaa3396cca49a0df8d99e208722e042e6f0182ec6e0da34c53c263bb5bec84769ed7524e23c3cdd0c226c4f0f629bd86903eb5a28ee224d2661c8c288218b8a0caf31a32e16bae99021b472a525b03a7f4f752442c8d734aa805fbf211382e5ddee0383390203ffd81b4f18319d407fc1b7f39d4b14f7b2534cc5eb54bbfbf80eedf424d589c507a4596fd041d509b340c3b228375794be6088cf267db195a5b8305b89c0a5fb72150dda83008980c276bf97561d5e69d0eb702fd11cd3029cd5edabe646ccaa95f406de627041c825736ec136062617d1f699f92571833100abd430173b890cab29013462498772419ca5049b72bd1e0c7dde56987ba2203ea7290176cf20b079bf33b446c90a13ded6af09a8734ff5d3b3b3234359917d074adb45e07c19e1a7ac82308c2dd2c76f7b5348c4130415fe", 0x1000, 0x400, 0x0, 0x0, r0}]) r2 = perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r3, 0x89e1, &(0x7f0000000480)={'lo\x00'}) sendfile(r2, r3, &(0x7f0000000040)=0x4, 0x6) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000009, 0x110, r3, 0x717e5000) 08:57:44 executing program 5: socketpair(0x28, 0x0, 0x2f, &(0x7f0000000340)) 08:57:44 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) close(r0) close(r0) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x200c4955, 0x0, 0xffffffc1) [ 1212.037430][T24406] loop3: detected capacity change from 0 to 16383 08:57:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x20048081, 0x0, 0xffffffffffffffa4) 08:57:44 executing program 2: creat(&(0x7f0000001580)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x10000181) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21d}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x3d) [ 1212.126198][T24406] loop3: detected capacity change from 0 to 16383 08:57:44 executing program 0: setuid(0xee01) semget(0x3, 0x0, 0x2) 08:57:44 executing program 1: rename(&(0x7f00000010c0)='./file1\x00', &(0x7f0000000040)='.\x00') 08:57:44 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x10, 0x0, 0x2f) 08:57:44 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/186, 0xba}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000040)=""/56, 0x38}, {&(0x7f0000000240)=""/49, 0x31}, {&(0x7f0000000280)=""/36, 0x24}], 0x5, 0x1, 0x6) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:44 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x4008000, 0x0, 0x0) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d5}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0x6, 0x29, 0x1, 0x7, 0x1b, "97c5c49be6e0f9f8ae5d0b6ce7631e8b2eb7d4"}) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x90, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:44 executing program 5: setuid(0xee01) symlink(&(0x7f0000001100)='./file1\x00', &(0x7f0000001180)='./file1\x00') 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ea}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 2: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/121, 0x79) 08:57:44 executing program 0: setuid(0xee01) rename(&(0x7f00000010c0)='./file1\x00', &(0x7f0000001140)='./file0\x00') 08:57:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff38) 08:57:44 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80) 08:57:44 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x4040054, 0x0, 0x3d) 08:57:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=@abs, 0x6e) 08:57:44 executing program 5: r0 = inotify_init1(0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 08:57:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0xc8c4, 0x0, 0xfffffffffffffe1b) 08:57:44 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x280) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf, 0x2010, r1, 0x6) 08:57:44 executing program 0: setuid(0xee01) socket$inet(0x2, 0x3, 0x0) 08:57:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) 08:57:44 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7, 0x47, 0x2}, 0x6ddf0c3de5e84705) 08:57:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x40091, 0x0, 0xfffffffffffffe0b) 08:57:44 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0xc985, 0x0, 0x0) 08:57:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}}], 0x40000ed, 0x40002040, &(0x7f00000005c0)={0x77359400}) 08:57:45 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x509080, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:45 executing program 2: creat(&(0x7f0000001580)='./file0\x00', 0x0) setuid(0xee01) utimes(&(0x7f0000000080)='./file0\x00', 0x0) 08:57:45 executing program 5: socketpair(0x2a, 0x0, 0x0, &(0x7f00000002c0)) 08:57:45 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x348}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:45 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:57:45 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x200080d0, 0x0, 0x0) 08:57:45 executing program 1: creat(&(0x7f0000001580)='./file0\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x20) 08:57:45 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x62) 08:57:45 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{}, "f9b02db19e6da195", "cbdbc6afafbbf30926a8ed4d853c00", "80f1fc4c", "538ddc9c35a3d3f2"}, 0x28) 08:57:45 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19ac53aa206b9eb4c29c07a5f919112bb21ed844ff13ba15ea8fc5f7a856aa041016365995db08e416a489d01931fe325fad0874270c47553b37a1d79860b14e81cda3df9084ad58c", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) r1 = clone3(&(0x7f0000000380)={0x8000400, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180), {0x6}, &(0x7f00000002c0)=""/138, 0x8a, &(0x7f00000001c0)=""/59, &(0x7f0000000200)=[r0, r0, r0], 0x3}, 0x58) ptrace$cont(0x1f, r1, 0xfffffffffffffffd, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="1b5b07070000326d0000888ad0194ded38cb00000000e77900000000b10000004000000000000000000000009deb23c4000000000000380000000000000000000100120865ff09dba56344f6c9fd3a68cf30c46bb7c7904eb95f3b000000000000dd5c59316e27407be15a2018487e20a84022e16f506edc10eca8cc679cab131f709d17d9cad989"], 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) r3 = syz_io_uring_setup(0x28c1, &(0x7f0000000340), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000eea000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) r8 = signalfd4(r2, &(0x7f0000000400)={[0x9]}, 0x8, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x2, 0x0, r8, &(0x7f0000000580)={0x1d}, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x401) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:45 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000060c0)) 08:57:45 executing program 1: socketpair(0x9, 0x0, 0x0, &(0x7f0000000280)) 08:57:45 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38d}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:45 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) 08:57:45 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x40220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:57:45 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:57:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:57:45 executing program 1: setrlimit(0x5, &(0x7f0000000280)) 08:57:45 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 08:57:45 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) 08:57:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40220, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 08:57:48 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:48 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) 08:57:48 executing program 5: r0 = epoll_create1(0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) dup2(r1, r0) 08:57:48 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xee01) chmod(&(0x7f0000000240)='./file0\x00', 0x0) 08:57:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 08:57:48 executing program 5: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 2: symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000080)='./file0\x00') link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)='./file0/file1\x00') 08:57:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006600)={0x0, 0x0, &(0x7f0000006440)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 08:57:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000080)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x5b0, 0x8, 0x0, 0x1, [{0x230, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x1f4, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}, {0x84, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x270, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x4, @private2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @WGPEER_A_ALLOWEDIPS={0x150, 0x9, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @remote}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "05320797e3230acd52e72194f370825fc7e8b2807b86163af00e04a6488254e6"}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x8dc, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x2e0, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0e02253d05c47fdf36600e1496c1193de8bea9f4553a503cd248fabda3f08fc5"}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x234, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}]}, {0x3fc, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1ad519d8f1f5b91d829c1528629958973b400745fc636226edfd85f660e0468b"}, @WGPEER_A_ALLOWEDIPS={0x37c, 0x9, 0x0, 0x1, [{0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}]}, {0x1c8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0579b5bed1682641de63c9116177c3b36c0ece29eedf95b593fc979294634c2e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_ALLOWEDIPS={0x13c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "60d57e7e6e0430bcec5882df623099a50eef890b2dad24f6eb5eb5d700a7d704"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0xec4}}, 0x0) 08:57:48 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002b40), 0x5884, &(0x7f0000002d80)=ANY=[]) 08:57:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000040)}, {&(0x7f0000000100)=""/237, 0xed}, {&(0x7f0000000200)=""/130, 0x82}, {&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/71, 0x47}, {&(0x7f00000004c0)=""/52, 0x34}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000600)=""/247, 0xf7}], 0x9, 0xfffff801, 0x200) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 5: perf_event_open(&(0x7f0000000480)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 2: syz_io_uring_setup(0x4fda, &(0x7f0000000180), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x2820, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1364, &(0x7f0000000380), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 08:57:48 executing program 1: symlink(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='./file0\x00') mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0/file1\x00', 0x0, 0x0, 0x0) 08:57:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev, 0x0, 0x33}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:57:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:48 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r1, 0x89e1, &(0x7f0000000480)={'lo\x00'}) read(r1, &(0x7f0000000100)=""/75, 0x4b) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='lo\x00') 08:57:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r1) 08:57:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) 08:57:48 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x32d8250ae2385f08) 08:57:48 executing program 2: perf_event_open(&(0x7f0000000480)={0x5000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:48 executing program 1: r0 = getpid() waitid(0x2, r0, 0x0, 0x2, 0x0) 08:57:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newsa={0xf0, 0x26, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev}, @in6=@ipv4}}, 0xf0}}, 0x0) 08:57:48 executing program 0: symlink(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='./file0\x00') mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0) 08:57:48 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x7000) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffb000/0x2000)=nil], 0x0, &(0x7f0000000040), 0x0) 08:57:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x9}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x38}}, 0x0) 08:57:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f000000a480)={{0x14}, [@NFT_MSG_NEWSETELEM={0x0, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x0, 0x3, 0x0, 0x1, [{0x0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "d0c496f9c71c04ea88d5a086055afebd61e6bdba89247675b5d42593eacdf37ff62923aa7d220b09bc57fa79dee22a0227187651e356fb76de610de4ccf0d77db3cbb4e8e00cea20fdecc54cdee5047929852d8978702327fbb4e2c51bb542db6ac73674b41ef748655aca82803735778ef95c03a5c11bb8"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}]}]}, {0x0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "ca1d28abba6c8ff3271912da45a944f3b1a65c35e907ad1d8ffba8684bfc31ad56e6470971db026514d770fece9f3100a48f937f48da4b8b36ff4c74ee2f2808af043cbe0804c0c3dd3b74f9b265df992a5a94a6c206003777aaea62d07bf991b46b532ced53e0a6f20bcbdc2050ae8c5f3b2cb8a6ade3aa4130fed443c3bf1c7ab3b986e7426369572390df518cdb80ff6915752c14dd57c80c29621289d4d27af971b3e8397f3398443fa4c224b39df96f8987161377a77581304d3da7b08ca70c1b385c78beb85aee1d8e319a0246234c26ff1ad2d254c4a1ea70e6"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE]}]}, @NFTA_SET_ELEM_KEY={0x0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "3292e54d8d0896dd8f0784c6c8f76a867636a64d8199b59c67338db7460ac54561694ec9da1530d5ced188789e387c12492c644ebf743c8c9ac520d0c4628977819f759c839ca1b64976a96426b58e4634e8053fed5fba007d4940f0286f5a0dd64e364aa38608753758a20a73d2cd268dbb39f20e507b88dbb828756f5014f61d4c236fc1f270760d93aae4908774dc5f568c7afa5ad36a3029fdca3416ed3f3ed96e9cc98856680fb6651b958c59e455528bf918786943f445a3edc9aedcd734fbe4baf666e756a8ea09b58daa51536b2bacd625439aa1c17f742a860d9dfc87ad29093a316753e48b5db31547f0d4"}, @NFTA_DATA_VALUE={0x0, 0x1, "9e92c31881cf5cbd35a0b36ff9f27ce293fd56006a76d88aa532fb3f9bb3328543f6e5b0b049c17f70034625839803df660e793250b66201775539898360a320be75c87f78e4ae8740292fd9270db70b706d3af1ac67d9363e8bdd9676e59a513bd3b7ee053ce36f90d9d16ae752b4dc8fe3092c4e7caf31741bd1b389ab4355ece70f61b236b136d9ce5d0466"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "a1868b4e3d1e9386abdcb6511c5950a895fdfe7c1b1431e80e207a91c1a0373b1d5eb55c2a023e166e3f14a0b1e75c0acc40235fb88b9af4a25a933da4bdc9fae1acdd2462ea4b2d698c8f62e3855cb4e19c46976ccb6a9908d883b32f19c228a91eb2d9457d3e749528a7e1d1f866a03b0d42fe0ebebb48200663e6c07fa0fd10d47e066e2d"}, @NFTA_DATA_VALUE, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "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"}]}]}, {0x0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "82a36a4850f89b62de81325b985518a761596278ecf1d745a5cd1579f5c6de9c20b4519f51ff97bf6510a340421c69f029169c7b9e27b945f0250c98dfcec3f28fb1ed460f806d981a5676c078fb6dbe86d06a8dc2648ebbb1f774b7b442c352baa71258eb78937eac0a7f9fcb13997d5d85513ea76ff5ec0913a3617bf182e03e6cca30a448f56cfdf73055ce6d"}, @NFTA_DATA_VALUE={0x0, 0x1, "de7b4f7438f493a127444b1aec177e0f90e92dd261ceb3ce4ef1152ab093df3e9f62ee1aaf24485a21d27de9448069252540bf7f02e840e95ee7d1802b50eff19c471f187de6b2bc065e43672d7c276a01e4ef57b33043cc77642890642985510a5ee1a52b98358d23e5c999dfdc59563350d39e4a17cfa42f1dc20ef468824c5a249632b174f7599a660d78e77a0e21d403a4dc07227aedbdd6598894cf2d51af9e6cc7f708647e01224123a0b2f723ebeb7f818cb02a7a2e5b8100e6c8128e57001dae120855099764d49296274965e3b713d3899f6f9b5ba7f4377ff97bea9e251bcb5134db0d1fc7e20112b9"}, @NFTA_DATA_VALUE={0x0, 0x1, "7812fc327b4051f8556975b93a"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}]}]}, {0x0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x0, 0x6, 0x1, 0x0, "e94ed2cb8a8e73530f7d84e71b1a5d4271ee9db1bb523dfdf1ae825ce0c2b3081da71447903ce592f76a86064a798be3287d16834f7dc53f8ea5559f4b4bb570e177f06b9ef2978f81e39c5075c5607ff652b5e57eecfa2909951ff11fac6fefee662db8447b9ce904a4"}]}, {0x0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION, @NFTA_SET_ELEM_TIMEOUT, @NFTA_SET_ELEM_OBJREF={0x0, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x0, 0x6, 0x1, 0x0, "98ccea35e481dcf5751d2a88b70c18af3539f77387403284abdb013e32e0a942af853aa7a05999d6ad61cd29e2bf086809d1314908a3e4ae004f27f2a24aa57f639a6bdbec380eedd7b58311edc63f5d8cd80ddd450f9fccac4b18a94241fdd127feb2100b41982b0ad4fd5fbca055580a4c2a22eb3cd76646d5f9ddd6eee0dcd95d2f374eccb702a11a7ca39d03a35cc3877e0877f29536f8d38ecf27417117a7812081320b06e7fea5770d65bd475a78a29198a4610f2fd28aadc02d6d0accc0a1303b0c2312babce3031b27f4ab68ed"}, @NFTA_SET_ELEM_EXPIRATION, @NFTA_SET_ELEM_EXPR, @NFTA_SET_ELEM_OBJREF={0x0, 0x9, 'syz0\x00'}]}, {}]}, @NFTA_SET_ELEM_LIST_SET={0x0, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS, @NFTA_SET_ELEM_LIST_TABLE={0x0, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x0, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x0, 0x4, 0x0, 0x1, [{0x0, 0x1, 0x0, 0x1, [@bitwise={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}]}, @NFTA_BITWISE_DREG, @NFTA_BITWISE_DREG, @NFTA_BITWISE_LEN, @NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_SREG]}}, @range={{}, @void}, @match={{}, @void}, @connlimit={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS]}}, @meta={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_META_DREG, @NFTA_META_KEY, @NFTA_META_DREG, @NFTA_META_SREG, @NFTA_META_SREG, @NFTA_META_DREG, @NFTA_META_DREG]}}, @nat={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_PROTO_MIN, @NFTA_NAT_TYPE]}}, @nat={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_PROTO_MIN, @NFTA_NAT_FLAGS]}}, @tproxy={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@socket={{}, @void}, @dup_ipv4={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV]}}, @counter={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_COUNTER_PACKETS, @NFTA_COUNTER_BYTES, @NFTA_COUNTER_BYTES, @NFTA_COUNTER_BYTES]}}]}, {0x0, 0x1, 0x0, 0x1, [@match={{}, @void}, @masq={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS]}}, @dynset={{}, @void}, @log={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_LOG_GROUP]}}, @tproxy={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@queue={{}, @void}, @cmp={{}, @void}, @match={{}, @void}, @rt={{}, @void}, @match={{}, @void}, @redir={{}, @void}, @byteorder={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@counter={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_COUNTER_BYTES]}}, @objref={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_OBJREF_IMM_TYPE, @NFTA_OBJREF_IMM_TYPE, @NFTA_OBJREF_SET_ID, @NFTA_OBJREF_SET_ID, @NFTA_OBJREF_SET_ID, @NFTA_OBJREF_SET_ID]}}]}, {0x0, 0x1, 0x0, 0x1, [@osf={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL, @NFTA_OSF_FLAGS]}}, @flow_offload={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz0\x00'}]}}, @byteorder={{}, @void}, @rt={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_RT_KEY, @NFTA_RT_KEY, @NFTA_RT_DREG, @NFTA_RT_KEY]}}]}, {0x0, 0x1, 0x0, 0x1, [@immediate={{}, @void}, @quota={{}, @void}, @range={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@ct={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@reject={{}, @void}, @xfrm={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_XFRM_DREG, @NFTA_XFRM_DIR]}}, @dynset={{}, @void}, @socket={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG]}}, @hash={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@synproxy={{}, @void}]}]}, @NFTA_RULE_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x0, 0x4, 0x0, 0x1, [{0x0, 0x1, 0x0, 0x1, [@reject={{}, @void}, @queue={{}, @void}, @payload={{}, @void}, @numgen={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_NG_DREG, @NFTA_NG_OFFSET]}}, @bitwise={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_BITWISE_XOR={0x0, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "a4e3f697b63d0d6ffcde879c2a7d3ba020f4256e30b8f489d147d5c4dbf951e7a48750ff72201bd83d2fc5ff27c034229b3dae0fc911f996910d928bafc4e17b0f6c34ad9635697cf322a596a5e072d3e24812f0d77979a3ee5cc5ceeb756d943b7595947c778256d01e31eed02a26d4a1305fefdfb89e41f1e7aa983e95a869a7407e7dcdbade119527374a9179caac8319c861935c38"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "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"}, @NFTA_DATA_VALUE={0x0, 0x1, "b814f34fb0a09586145a2c56d3079f8957ed877410a4ee33ac13ad7930b5903f72cce831927566d4989f12cc5158321e551098d2c2384dfc10fe87617519cda9236468891a1d0e379f5cbbc4a7e6e57675b0d8d9609829ca13b38ee6df96f4baffd7d9704d1ea6b5bd0866fd0c2e83a3b7ff27713884187acba2e86f796fa0488b1dff333cc1fb08d5eb7568e21aed7e02d29c3de8ab4057fd0dbdfd77e8b097f68a3223f6632e06f0440dd6c24875f1abbc1efb1fa90ab5d9f6f1dfb070"}, @NFTA_DATA_VALUE={0x0, 0x1, "20dc88d44e26ec42c21a8411ba7dabbdadfeba89cafe1220cdec6f951a2645de3d3057ba64e88c360dca4d5d5984e3fa93f114530bd4f0543f2910670af5a2fdeef0dd67f04ead52f8f02e0ddbfb0e78ad2802b667cb4dabb7dbeec1e0d964d6d1354985cc820e"}, @NFTA_DATA_VALUE={0x0, 0x1, "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"}]}, @NFTA_BITWISE_DREG, @NFTA_BITWISE_DREG]}}, @bitwise={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_BITWISE_DREG, @NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "98110cd21bccf10c86b360998d3f83ce328b7116639ff7c80ca892a56af4b53098f2251692672490c5551e691ed43e1ffc3462aad608c14717dd95e4839eb4cc14f09242f761706953733cb0469db840671ed9bc489a25674970f61a79244055ff34f69a42631781f5553d54aa84ee2d49a2abb23b85c7914bd223b3482ae8e4521add94e0912f65937e32cef5595a1f17b1faf0a7e1c75da2c8f3ae4f62fd20cc1503de175945cef315f7efb1b792a5d666c444fedd6edfb46b5ded61b8323a3ba333a7dea7bb80968248d5bed6d46bf9"}]}, @NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "cb8d084870e6af446a6cdb1ae1edd58f23f881c5fedfd32857b3ac74097bbb6cec6b7a1ad474a339bac5d451c8a99cce9b7361d3ef276b93b6f9d309d1ebdb9968afd4b4f86e7ac132a33dd33f12f5ec0836d35d64587cade44ac78fe859a4a5adc37606c4b563394981bc0675debc32ddb24a2ad7212005090be2664aadb04edb497985733223f1b1bb19ffab1a1afa9c7fc5af387838c26942249b906fe991e9b0c538599d7d3a2468ffba08ac9cbef22080bf4faf53f3a10676291709d3d864871444a4892ea0157d268fdf0a8cef0440d42693705a91191439efce06dd35660e6cdcd8118265a816a7b26203e9"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "10ca87c4d699cd3fb796f8a41282d9fc"}]}, @NFTA_BITWISE_DREG]}}, @fwd={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@limit={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_LIMIT_FLAGS, @NFTA_LIMIT_UNIT, @NFTA_LIMIT_BURST, @NFTA_LIMIT_TYPE, @NFTA_LIMIT_TYPE, @NFTA_LIMIT_UNIT, @NFTA_LIMIT_RATE, @NFTA_LIMIT_RATE, @NFTA_LIMIT_UNIT, @NFTA_LIMIT_UNIT]}}, @masq={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MIN, @NFTA_MASQ_REG_PROTO_MAX, @NFTA_MASQ_REG_PROTO_MIN, @NFTA_MASQ_REG_PROTO_MIN]}}, @reject={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_REJECT_ICMP_CODE, @NFTA_REJECT_TYPE, @NFTA_REJECT_ICMP_CODE, @NFTA_REJECT_TYPE]}}, @dup={{}, @void}, @match={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV, @NFTA_MATCH_NAME={0x0, 0x1, '/dev/udmabuf\x00'}, @NFTA_MATCH_NAME={0x0, 0x1, '\'\x00'}]}}, @ct={{}, @void}, @ct={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@quota={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS]}}, @flow_offload={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@payload={{}, @void}, @log={{}, @void}, @osf={{}, @void}, @cmp={{}, @void}, @quota={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES]}}, @notrack={{}, @val={0x0, 0x2, 0x0, 0x1, ["", "", "", "", "", "", "", "", ""]}}]}, {0x0, 0x1, 0x0, 0x1, [@byteorder={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SIZE, @NFTA_BYTEORDER_DREG, @NFTA_BYTEORDER_SIZE, @NFTA_BYTEORDER_SREG, @NFTA_BYTEORDER_LEN, @NFTA_BYTEORDER_OP, @NFTA_BYTEORDER_OP, @NFTA_BYTEORDER_LEN, @NFTA_BYTEORDER_DREG, @NFTA_BYTEORDER_OP]}}, @match={{}, @void}, @limit={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_LIMIT_FLAGS, @NFTA_LIMIT_BURST, @NFTA_LIMIT_TYPE]}}, @cmp={{}, @void}, @numgen={{}, @void}, @cmp={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG, @NFTA_CMP_DATA={0x0, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE]}]}]}}]}, {0x0, 0x1, 0x0, 0x1, [@fib={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS, @NFTA_FIB_DREG, @NFTA_FIB_FLAGS, @NFTA_FIB_FLAGS, @NFTA_FIB_DREG, @NFTA_FIB_RESULT, @NFTA_FIB_DREG, @NFTA_FIB_DREG, @NFTA_FIB_DREG, @NFTA_FIB_FLAGS]}}, @notrack={{}, @val={0x0, 0x2, 0x0, 0x1, ["", "", "", "", ""]}}, @tproxy={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_ADDR]}}]}, {0x0, 0x1, 0x0, 0x1, [@reject={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_REJECT_TYPE, @NFTA_REJECT_ICMP_CODE]}}, @nat={{}, @void}, @lookup={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_FLAGS, @NFTA_LOOKUP_DREG, @NFTA_LOOKUP_SET={0x0, 0x1, 'syz1\x00'}, @NFTA_LOOKUP_SREG, @NFTA_LOOKUP_FLAGS]}}, @dup_ipv4={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV]}}, @bitwise={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_BITWISE_DREG, @NFTA_BITWISE_XOR={0x0, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "c0b3a19f379bccf086b6484f44c4c43caa5b74a2cbba6346eabb01bec9b1de59b74a40c2b30dec1d9ab377e6bad1facae1b561daf34467198639de6ff082e412e40be2d82a0e7737713f60cfd7431782dc8545eaddb102ab6e769b32c5d435a8e9dcd037"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "c77e37f82bae65b5b8f9c2ee4891992de633a304ccf640c6221f90c0535cfb6232b6c84347e72b5ebcbb1542257dc29a010f2c7656c2a2cf26d976d3c9dd640f391296ed10e90d66f46d91ca9d733e825f32a22e871823824330895b5f38f12c87790de71d9342db4ab02a355789180255c12c9501a73430d82190a30e34a025cd3e9b2fc0730894ce4b2291593d13ae91c3237de29e56e38db12b20"}, @NFTA_DATA_VALUE={0x0, 0x1, "9ca643a7f3e8e518fb537e423bf8362d1b6378632d8e23b636d024d7dae55ec4ad6fc1c4f97d3627ecbde1a596a833bc4f6b216651aa81c282544104eaba1400a469ad714897019f44d8eac9dac019349353db62f70f8eb5dc143a8ce09b4823ea87ffc0052b942edb4f731ab8317661303bda650e8d47f6b085ae2547baa938"}, @NFTA_DATA_VALUE={0x0, 0x1, "fb121197dfaa404f48a4f1acca728fb23b5dd9ef630a975fd1c1a7f93a37f1eca25efb1b728bf073135806d6a7a30a67592705ded6a85fbef58684afbf4150948d7503a1f4dd79defebf58113b267779ebe748c90c29e181d9695709b35b0fd0612445924656de3f9456d79bda0405dccfc9fc4e076375cb7262f5e2f0990309"}, @NFTA_DATA_VALUE={0x0, 0x1, "407d756ff3a6736432874262e011d56717e8769a5073283e9ed468f33e1a1cd9f76b38970107efbd95cef37cd608900bb4110df46ff10a58021d9a0778caa486c9aef6be5c190b792bacddeb5a4696b37bb919d07fd4158e70e4"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "35115485685e3c86be5ae738de012c6a88adc9a47e75f83181c2e31291ca9c272822deefea6d576bddf58ac791c68255974f066227b7f14a5132840d59c2611c164d706fd545f2988b51a5000872b41d3657feef40ac94c602a0f967853335002a6e47cfc3e39105dfaecc562a36aad8f70f70ab6518522a43e884e76af949619499c245e5d4fd14907cfb131c473a070b03161387c8f78257113ab53f7c376d97389bee6a6daaa330511b5c6f76f6f9974c4ebdffc4aad3c7"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "13999b105c713b9531d84860550dd05993c58e7a65aff548460d77163e407c5fe0ef6bcb30d0dfa071427277a36597aa8c855c24db22207f783b63afbe8b339141f2ddb590f226f45ea50a6abe939d1922852c97939aa0b912a2c472b7297e7d0796e77ea4800384c6b516013f3f88508672cc12881ac1910ef08d79de2e95a438fe1ae6bd43cd94a5f3699a601e79705900eb8b8f4fc4214f406b412104db5b"}]}, @NFTA_BITWISE_XOR={0x0, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "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"}, @NFTA_DATA_VALUE={0x0, 0x1, "e6d36a50c6be5cc8f395a7ee213c864c8af08dfabde5632b8eef7e7325610049b7b0793ad860d7a8924cfb8a094650be5e69f389307a1d81c2b0265a79906b4138470e7508dba3c24a78bb5ca78117467b34738e4370be120bde8601ac0d65c47c89c4b9a54d0d7f1f25ccd366e7eae51a639581"}, @NFTA_DATA_VALUE={0x0, 0x1, "800b0e5a3c4b361a1430230c521025868a544d941ccaa05abbf94708a28609d53faad1a443b39b2199dd092859b34375f70b33c83a03f7059db042f5936919a579b97bd7b56cbd15affee00061a567663a368a587546f4a72eaef03b461eaf80ea221f185fc43e2f6d3101c4d22f241ce08d0896dcc8f35fe319d49d7924c93560b85f5f313249ed231893850bc483fd0f680495e4fe0ace510ed1"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "685ca2ba053947d196367da5f47d9bfce65ca982b6a9be49f582d8f5"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "37eee675e9490bfec8fad0f9026c54bc291655ca365cdeda2f3c793b03075e9806a89ade4bc7b56ea7437312b83f03795eaf80ec7c47711c17df65f3f07b5cf85870f490b0323159db1a4c451cdb1e805e42dba7adfea482f98d20969c7ef18e"}]}, @NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "aeb47e375095fcc4179c65635f561536a668cc6830a3eb99cca828bb8866d1b20ebb43c9207294c8a874b94578354442dad489d6d409720808ae56c8d2c170d8cb18797c8c7713387a87d579935767092a0b209a622fc723666571399c18eb9a0f4fbd1d7b960788d14020b760d547455a91724cf80c0435a8cce57d3b4f6d0e0f833da0953f71cb4ec48b5834737607a21f3ffe8826f81ec4edcab86d0521b1fdbe020fd058fe2c4201372b373fb401074b2121729a248d08e85ce1d29906be2038d43a22a8416db2ae408c348cfde9d42e2d250e1815327881c3521cabbfb7242b4b03502ff266a8b562fdeb4d"}, @NFTA_DATA_VALUE={0x0, 0x1, "f87ab6e6203fc9a415cd18e2ff2f9398476022b0d242f4b18fc88e36dee9fb9de7d1801ee430fc29a28ec447386a3afb8c4d8379a26385f1aee749eb86ac34689256d34c2808a5ec8f66585cd55fdf4d5ad219da0d9e9354d2a0137fa9955b9cf9960efa662414e238ea5a7d1fa98292b67e9724c5"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "df98bc1a7ccdf33343df9c"}]}, @NFTA_BITWISE_MASK={0x0, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "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"}, @NFTA_DATA_VALUE={0x0, 0x1, "c5dcb3e99231f265034be9fb4cab3275ab7db32e1d9662d1b5c391427d85d79de75d02e8cf15aec20a476823c8836e294fb5978415736b55c7251c866f685ba9a0fa1762d82318c5604297f3901b893ad49533a6029bc43f30879afc0ab4b7bf8eedfd771aff08ce02651eeb5a06889d23a16e1191818ca88c7a2b90f04570abf8fd81a4cf886e3404dd978f94fd87e1ce52477d3880c7fb959d"}, @NFTA_DATA_VALUE={0x0, 0x1, "8b67e200ebf95c61"}, @NFTA_DATA_VALUE={0x0, 0x1, "5b76d6baaf19badb3057df6073d064d1ba47cb2d3918c2a459c071cbea4cd7"}, @NFTA_DATA_VALUE={0x0, 0x1, "9f300b9500efd397454d81fbd7169f371dc39585ae307fc7b24f2bc8d31f210f8e111fa9468c521d288c2a638a07a883f2e2cec0422d00"}, @NFTA_DATA_VALUE={0x0, 0x1, "d1630f5695b62a7438d323f1414ca534fb1f81f9841cab4a72c57b033695873f0c56e6597da8f92d2ec74ccf18363b39ddca9405cbc11461919b081efeef180b8fcf9c41b4fa43940948d5bbf991a6e5f6f28e0ef9acd37832970a"}, @NFTA_DATA_VALUE={0x0, 0x1, "a85404647db155a2f29a8bb699c7a7e1a6120e5728ffdbd835622d5338d7cd51bd66f67fa8d80b164eb4054dba201bd470a4ee10bc451414bdb492efc759abc1f6688a14d3edae5e63ef5c9890a800"}, @NFTA_DATA_VALUE={0x0, 0x1, "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"}]}, @NFTA_BITWISE_MASK, @NFTA_BITWISE_XOR={0x0, 0x5, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}]}]}}, @synproxy={{}, @void}, @match={{}, @void}, @cmp={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_CMP_DATA={0x0, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "315eb41da38cff8d42646d0e4fbc46c4e768edf5f8bf67313b72c1d624657e8e2f3da28cbeba886168f9580fcbce89b79067d780aaa6dd15e56ffa192d5700502a86e0f811cacbdf1077c017d9676b7d86a001d05b3e2b9aea390202542865560e756fe25f44a09d7ba6c8674fb8c6"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE]}]}, @NFTA_CMP_DATA={0x0, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}]}, @NFTA_CMP_DATA={0x0, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x0, 0x1, "01129dfbfd338123369807de882ef316ec57b658eb39947d672e3d09083854dc88bb619697ce4fef09c71b11803c0fd1d8967432df1f55968348f924fa1ff91d9bd445b8584b994483cde65d9adc4bc11c24159a00300a4fb2e682f2ca3d7ab3a44fbe69254c96acc9e9cd265f5cd28d9d6b7e4f99ce7d44accd6b91d056e3da43359ff9658eee621c3d"}, @NFTA_DATA_VALUE={0x0, 0x1, "6783f9c23c061f164eeac0b1d4a816050feacb6327e4002d7db15f0ae942fd01eca8c890fbba98"}, @NFTA_DATA_VALUE={0x0, 0x1, "3a6bde41608fbc9bfc5b9f19f77b5e1140c44bbc42cf075e33b92f9d1d842748be21047fbee464a26efbe3a256afc583dcce3c8aaa1b8c485ec09a8f"}, @NFTA_DATA_VALUE={0x0, 0x1, "216af6ad348ec7c5346226d1a26f8335523186e93602ebce54e2b332d97d0f2d456737d1ea0f7cd9adc588"}, @NFTA_DATA_VALUE={0x0, 0x1, "20c091acd85a405a124886d601267130607c24466588d0b241c3f9cce211311721"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}]}]}}]}]}, @NFTA_RULE_EXPRESSIONS={0x0, 0x4, 0x0, 0x1, [{0x0, 0x1, 0x0, 0x1, [@dynset={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_DYNSET_EXPR={0x0, 0x7, 0x0, 0x1, {{}, @void}}, @NFTA_DYNSET_SREG_DATA, @NFTA_DYNSET_TIMEOUT, @NFTA_DYNSET_SREG_DATA]}}, @immediate={{}, @void}, @masq={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MAX, @NFTA_MASQ_REG_PROTO_MIN, @NFTA_MASQ_FLAGS, @NFTA_MASQ_REG_PROTO_MAX, @NFTA_MASQ_FLAGS, @NFTA_MASQ_FLAGS]}}, @objref={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_OBJREF_IMM_NAME={0x0, 0x2, 'syz2\x00'}, @NFTA_OBJREF_SET_SREG, @NFTA_OBJREF_SET_ID, @NFTA_OBJREF_IMM_TYPE, @NFTA_OBJREF_IMM_NAME={0x0, 0x2, 'syz2\x00'}, @NFTA_OBJREF_SET_ID]}}]}, {0x0, 0x1, 0x0, 0x1, [@exthdr={{}, @void}, @dup_ipv6={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV, @NFTA_DUP_SREG_DEV]}}]}, {0x0, 0x1, 0x0, 0x1, [@redir={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN, @NFTA_REDIR_REG_PROTO_MIN, @NFTA_REDIR_REG_PROTO_MIN, @NFTA_REDIR_REG_PROTO_MAX, @NFTA_REDIR_FLAGS, @NFTA_REDIR_FLAGS, @NFTA_REDIR_FLAGS, @NFTA_REDIR_FLAGS, @NFTA_REDIR_FLAGS]}}, @meta={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_META_KEY]}}, @fib={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS, @NFTA_FIB_FLAGS, @NFTA_FIB_RESULT]}}, @dup={{}, @void}, @numgen, @payload={{}, @void}, @byteorder={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SIZE, @NFTA_BYTEORDER_LEN, @NFTA_BYTEORDER_LEN, @NFTA_BYTEORDER_LEN, @NFTA_BYTEORDER_OP, @NFTA_BYTEORDER_LEN, @NFTA_BYTEORDER_OP]}}, @fib={{}, @void}, @dup={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@target={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x0, 0x1, '\x00'}, @NFTA_TARGET_NAME={0x0, 0x1, 'wlan0\x00'}, @NFTA_TARGET_INFO={0x0, 0x3, "0232897a6fd8c6fac1f5b8d57c24299c7732845f4cbf3b096824217b0e416e2fe0d048157ccfa141a55539d79fbf8dfe60bf95947724ca0866423b5cc71c7c2bb836e6f247fd8b6a9ca1fe43e4c134031849ec5989cfe0ab51a5bf9e15d6c3920c64f60b3e70bc286ad59d06ddda36cde32a2ba2880adf1eee13b282f654aeb19a451e499c"}]}}, @osf={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL, @NFTA_OSF_TTL]}}]}, {0x0, 0x1, 0x0, 0x1, [@log={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD, @NFTA_LOG_QTHRESHOLD, @NFTA_LOG_LEVEL, @NFTA_LOG_SNAPLEN, @NFTA_LOG_GROUP, @NFTA_LOG_LEVEL]}}, @redir={{}, @void}, @immediate={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "9c049719e4c705f8d929969bf934f6bba61ae899ec2bac0e30ca8165768eb627e6bd303244b6f8feb1a6892be3f39af9445d235dc48ad6119d912fd06127c1e85f95cb0f5da60d7b088bae62039d69dc271d92d825630491831359346303e2ec3715ca8c847fe1d615b288a5748349defa5599f033dff8d904ab3b0af76d1b17cdf9b27faba3ae6d6d726122e875b03a4e023eb3588573e251868f3e2d17e9ace86eeb1e7d493448c34768ce08ba33276bcd924754cd56d0ed61e25bc9c8dfdc426b2689df60593b0d446f18272cc5379c0e9fc53a0486551f33fb7f7c092533ee36043017f8e068fc4834b1020aec541430"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "0c93636faeec909836de30011d66b219f79df0232049b350ffbae2c7bf97548d1cd1ec4122ade1b73ab804f89e8fe64d7ab4198b5cd15688ed05b7093c3bdfa4021a76a0ef06e7ccbec6b392eed70ccf42799560d897f57764755dc49321b2a342bc759c9689f0d0d2953dcb270468455639bc655029ec918129e71ad982b59a1427ef949e8d6d7cd005125eb0567494152eab64da9460b570ec8d8516ae7e32c472b670cf5f3cdb566fea7ebca94afd44aeb08aad2b5302b825f77390d12e48a7c81537f88273766bc17ab7dc925e38c0d43a7aa67784aad94e8b5c4ba5249085466c"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "b495dc28d998e9f7e73b5fedff04a2eede9feddf116ba3445be561eb6d5ce7528e3efd078ae1a72bc7104d3b28850c5190482439eff9de54dd2aed876f98d3ba67661f230fa2b436ea2b4b4db5cffb4886be3bde7e19999ece848bdca4e927419b59b2c08c135daa547f3a3b9a3d2ee722abc65372354923f3f30dc198789befb46301cf75bc641c81131edfd9f8d9b1c5a53c1e9c4c322cd44710eb3fa473d5b8dfe2200f177389f6613ecb10"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "9261c3dddba72da840518b26c738dba70d10fc2eaf80632f95cfa98b10b86b78e8e714eae5ccc2c43b9799a86244"}]}, @NFTA_IMMEDIATE_DREG, @NFTA_IMMEDIATE_DREG, @NFTA_IMMEDIATE_DREG, @NFTA_IMMEDIATE_DREG, @NFTA_IMMEDIATE_DREG, @NFTA_IMMEDIATE_DREG, @NFTA_IMMEDIATE_DATA={0x0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VALUE={0x0, 0x1, "8470f4f6753a4f69647bfdab18bbad26cb3cbf83e57fdb3e8882dd768b763686f9faa9cbaf198f6922b68ae8c35da9bf9d570b9eb5ef1baeb812f4d19ffc2f"}, @NFTA_DATA_VALUE={0x0, 0x1, "cb479a0d4837f51ecc7bf0ee6470fddb2fb7a94e6d0806ac8276f0c16e869ffb5171b47ac033fc37110be453603fb7a1a5801e20a400ba93688a5fec96e46772bc36b627fc4d64beb9b92e087b776c7f186caf0a4af30f07f98d6ca9c92d71b25e99a40aa892dd3cf539dcaa0b227602ce49a587f7c956fad52c600f626de22ec9b85754ae1e3cb3a232319864588e4f4078a7936db2b03efb91808cc211c321105aa0a3e01e14a0ed1481b91bc531e16709efd882e214141caf369e57e1ce5b4fa819b525d657aab650eeb21b80ae6842a543277905c6d9aa1d7103a6e4ec2c"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE]}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x0, 0x1, "15ef7f8e4916ff7f2ab916a28ad287aa39018dabd798a76c4ce88fefa04219c3b7353b6656eb69f0b1fd9b751d7355c04aabcca149c2f01b9222595ecc96a706ec5ad265f1c549326988b1bf686c11be04804a5b39a3a15bb93963cfa9620897b58c1fac1b48adbd72bfb0269093cf11c35203cfba43d78a814b0a493e86317acd4d6285d48d8f42baa28a967ec5f6fb135dcf063b1ce8c26c859023db56067967bcfbc3f257df15fb4311f746cc3301137a7d3dc84cf458666ac662ac7333aee9d88ca03fe228633406abb55c0ecfdb312c"}]}, @NFTA_IMMEDIATE_DATA={0x0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT, @NFTA_DATA_VALUE={0x0, 0x1, "7fc4f0512038bdc9358359aab3600a4a404fb6c824a33f0ef2b6d138fb23881274bd7470bd7a3701f4d7975202e03c38a60a760d74a93ec81022403fc2a259f114827c7694d75c29934e6d810e605dc47e735b74b7e4e0a0620c73f8a20c699919d5a7f544660b5390e0fdc8e819bb671a056129d75416bce8f177091192dc24254a16cc0b2bbaa6cf47371c1f3e4edc896d11d90166ec7a3b27930f"}, @NFTA_DATA_VERDICT={0x0, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CODE, @NFTA_VERDICT_CHAIN={0x0, 0x2, 'syz1\x00'}]}]}, @NFTA_IMMEDIATE_DREG]}}, @synproxy={{}, @void}]}, {0x0, 0x1, 0x0, 0x1, [@ct={{}, @void}, @flow_offload={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz1\x00'}]}}, @quota={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_QUOTA_CONSUMED, @NFTA_QUOTA_BYTES, @NFTA_QUOTA_BYTES, @NFTA_QUOTA_FLAGS, @NFTA_QUOTA_BYTES, @NFTA_QUOTA_FLAGS, @NFTA_QUOTA_BYTES]}}, @match={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0x0, 0x1, 'wlan0\x00'}, @NFTA_MATCH_NAME={0x0, 0x1, '/dev/udmabuf\x00'}, @NFTA_MATCH_REV, @NFTA_MATCH_NAME={0x0, 0x1, '+\x00'}, @NFTA_MATCH_INFO={0x0, 0x3, "a8020d2d5e72c4feb44a946acffce2bd3858144a96708951dfd7748943e0587bc9b36488f0589be8cff6e78d6ee6b9ceddcf875089e1ce62f7d125f13de7baab43eb51d02416181e3f98c1ebf68e3cfe91ab4e864c91600ea2d64cf0698662ad63"}, @NFTA_MATCH_INFO={0x0, 0x3, "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"}, @NFTA_MATCH_INFO={0x0, 0x3, "d65e7a5f64134fe60d1f4e48a992689d9ca45463b12a88f4e51af65c42246729d3a5749eba0d41ef8d1b9021cb1edb248b346d1f68a76cd6e278f1cae098faf0e66c525aa80df8975da2edc18f126ca6ba515c92db90c0ccd9b2cc2fcd65f9d35dc24482e2dcdb2a6dca8843f48c39d3c6ec7165d53b77ab2c56be527ec4389aa72d9196c3e6792287889fa75fd4835e03ad16146a420910bf6332bd4b506ab8a1a27d9e771f12c9f7c5f4491fb64a08a2c444"}]}}]}, {0x0, 0x1, 0x0, 0x1, [@counter={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_COUNTER_BYTES, @NFTA_COUNTER_PACKETS, @NFTA_COUNTER_PACKETS, @NFTA_COUNTER_PACKETS, @NFTA_COUNTER_BYTES, @NFTA_COUNTER_PACKETS, @NFTA_COUNTER_BYTES, @NFTA_COUNTER_BYTES, @NFTA_COUNTER_PACKETS]}}, @synproxy={{}, @void}, @target={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x0, 0x1, '\x00'}]}}, @numgen={{}, @void}, @synproxy={{}, @void}, @notrack={{}, @void}, @match={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0x0, 0x1, '-!@*.\x1e\\\x00'}]}}]}, {0x0, 0x1, 0x0, 0x1, [@dup_ipv4={{}, @void}, @fwd={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV, @NFTA_FWD_SREG_DEV, @NFTA_FWD_SREG_DEV, @NFTA_FWD_SREG_ADDR, @NFTA_FWD_SREG_ADDR]}}]}, {0x0, 0x1, 0x0, 0x1, [@tproxy={{}, @void}, @lookup={{}, @void}, @immediate={{}, @void}]}]}, @NFTA_RULE_EXPRESSIONS={0x0, 0x4, 0x0, 0x1, [{0x0, 0x1, 0x0, 0x1, [@objref={{}, @void}, @flow_offload={{}, @void}, @rt={{}, @void}, @payload={{}, @void}, @tproxy={{}, @void}, @reject={{}, @void}, @match={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0x0, 0x3, "29a4cb0a0470a0d5074d8a5006cbf1203b4d98d3afc35d607d20c5fe2875b895fc6513c0a621594c5d6abb49d4cc33140dfcec0fa0df4ad5d1fdadbe70bf764dab9947befea25349df48154f5889b597e55d49653f2ecc84"}, @NFTA_MATCH_NAME={0x0, 0x1, '\x00'}]}}, @log={{}, @void}, @tunnel={{}, @void}, @connlimit={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS, @NFTA_CONNLIMIT_FLAGS, @NFTA_CONNLIMIT_COUNT, @NFTA_CONNLIMIT_COUNT, @NFTA_CONNLIMIT_COUNT, @NFTA_CONNLIMIT_FLAGS, @NFTA_CONNLIMIT_COUNT]}}]}, {0x0, 0x1, 0x0, 0x1, [@payload={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET, @NFTA_PAYLOAD_CSUM_FLAGS, @NFTA_PAYLOAD_SREG, @NFTA_PAYLOAD_SREG, @NFTA_PAYLOAD_DREG, @NFTA_PAYLOAD_CSUM_OFFSET, @NFTA_PAYLOAD_LEN, @NFTA_PAYLOAD_OFFSET, @NFTA_PAYLOAD_OFFSET, @NFTA_PAYLOAD_CSUM_OFFSET]}}, @meta={{}, @void}, @fwd={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_ADDR, @NFTA_FWD_SREG_DEV, @NFTA_FWD_SREG_DEV, @NFTA_FWD_NFPROTO, @NFTA_FWD_SREG_ADDR, @NFTA_FWD_SREG_DEV, @NFTA_FWD_NFPROTO, @NFTA_FWD_NFPROTO]}}, @flow_offload={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x0, 0x1, 'syz0\x00'}]}}, @nat={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_ADDR_MIN, @NFTA_NAT_REG_ADDR_MIN, @NFTA_NAT_FLAGS, @NFTA_NAT_FLAGS, @NFTA_NAT_FLAGS]}}, @counter={{}, @void}, @socket={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG, @NFTA_SOCKET_KEY, @NFTA_SOCKET_KEY, @NFTA_SOCKET_DREG, @NFTA_SOCKET_DREG]}}, @target={{}, @void}, @hash={{}, @val={0x0, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE, @NFTA_HASH_SEED, @NFTA_HASH_LEN, @NFTA_HASH_MODULUS, @NFTA_HASH_TYPE]}}, @immediate={{}, @void}]}]}, @NFTA_RULE_POSITION, @NFTA_RULE_POSITION_ID, @NFTA_RULE_ID]}], {0x2d}}, 0x28}}, 0x0) [ 1216.122189][T24694] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=38 sclass=netlink_xfrm_socket pid=24694 comm=syz-executor.5 [ 1216.141219][T24694] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.5'. 08:57:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000680)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)="241ebf40664e6c500a6d3fdff7d68de6fc5eeeae12633c99695ef0944729b31952a6f734770553ed02e538c69a3bfff40d09da9ce132d138a06fcfcc52c1b2fbf1b8d063f7b21a75908bd3a53f8e438754bff7369f7ed0fafa5e40a7236bb688ecb76aaf12df06a76db88a9313f88f7e378c23387e1e2530d6b51df70312422c989d5a1878dc9f0c85e65a56df601015e13871493bd5beb83af1cfcde3f0c67d628fa9d7e7487150788ca2b88c59", 0xae}, {&(0x7f0000000240)="2332f7de233ad61a109ff3c34d74858e996cf6cab46c97e4df2cd19077cfa7adf94b4aa25690fd0b43328c45f7ae4fcdfd9e34a28f8b929fe5e3f6c9b40b526e9417200109907c028e3fa282349de458ebabe847416ed718edf40821cc5dcbbe950e5c89751e9e20d8f3", 0x6a}], 0x2, &(0x7f00000002c0)=[{0x70, 0x105, 0x8, "ef47d5559f2170d1025bdb45553e471be85e65bfd106eaeb3bb96895d4d0100038bedb04b19b6e5430d870e68a465fd3dabb0d8e9f00fd8d1bf5ac136e3ff9cba6d5b333367a7c38ed263d4e6316e33695cce0c780110904e98b6d9aa079"}, {0x110, 0x100, 0x1, "0b5bdfd1a3c469bb7c5864590621ac8269b07a7f73c1622e81e22a87f537637f4a3f9be9390ccf2a7b8f4b7f695ae87563b70f29182936d3dbf4893c39e1e96682c583684fe8cfa3c65de0507e0f88ae7d9816d08173089f72f1cf1021004af8876e4ecca0e36c4bc7cc7ae9a0188f95e324d1a4116d22402d5c4a2c220ac333a3f50d250a93729573cd9f1a30edd713b96f9e82a82d7ab629d27ec1a07f94b6a5b86c383301bf506cea7794453f9d939fb85f36dfc389844d52f9d1c29ab143eccf12dcf8e2d5c81aee40bb6da7499372ef19d635f6976940199a05652de7f9eb0aa3be76abd9622a9769fb5cea94cedfe55ab554b603e61b"}, {0x38, 0x104, 0x9, "4fcc71b13be9d61c726e792053b1dbbed784be3af9464ffda4e749a9004160e719fe43bc5d8cc189"}, {0xc8, 0x10f, 0x80000000, "3ce205225f78f8d9200287f08d473e5a0d89f8ec8d4e7b0d8203dcddfb44eff4548920b4c0b08e256ae6efe151a5402c429041bfb300e77dac88304536141233e4d86a85064272eefab8151cafc74c433d50cd4f0e79969052cc0febd8da762a5675a09f2f92ff95850c04b941d8382a85f95b5ec4b94fcf62b444ec0ec7be935e364fe1414951910b28b7d8603f6f408b138cf47c05607f0a2e98b8591e66baedb60ff76287cb730828814ca24c5394b74134"}, {0xf0, 0x3a, 0xfffffff8, "c209c8a9ffec091dccbb962aba2bb0f39bd1eb45818e6581ed6a42d07559fc1fdc72e9fac5dacd0dddcd502b22c2491ee39114b554dd9da5e4d6c5f6ee745659f70e623240f5bfc86fe4ae76740351c4ac764909c3cca37181fdc3ab70219106e2b9615da9a5b3b1b07519dde3ad81c0adab70adee7abae25d118e1b616e5513086fad24bbc9b4eb6467c8eb241a7f43e33cae7324eaee612be752b2c83e35d9fe201e32da0988ef63fc12174f773ac0aa19f1b456f01d3f1aad121d23d43bb4e1d89d76c96b7fc4034756d003108df2330a5b2bb0398259d8e6"}, {0x28, 0x84, 0xb2, "87c89322003cbdc2ed90fc2ebb552a274f5fde2c77c703"}], 0x398}}], 0x1, 0x20004000) 08:57:49 executing program 0: symlink(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='./file0\x00') mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0) 08:57:49 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x100000000, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 08:57:49 executing program 2: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:49 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:49 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003cc0)={[{@size={'size', 0x3d, [0x65]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '#/%\''}}]}) 08:57:49 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4800) syz_io_uring_setup(0x2e9a, &(0x7f00000000c0), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 08:57:49 executing program 0: symlink(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='./file0\x00') mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0) 08:57:49 executing program 5: syz_io_uring_setup(0x4fda, &(0x7f0000000180), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_setup(0x2820, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 08:57:49 executing program 1: symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000080)='./file0\x00') name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@ceph_nfs_fh={0x8}, 0x0, 0x0) [ 1216.936649][T24727] tmpfs: Unknown parameter 'smackfsfloor' [ 1216.946867][T24727] tmpfs: Unknown parameter 'smackfsfloor' 08:57:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newspdinfo={0x24, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x24}}, 0x0) 08:57:49 executing program 1: clone(0x4e100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x4000, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x1, 0x0) 08:57:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x1010, r0, 0x2862b000) 08:57:49 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev}, @in6=@ipv4}}, 0xf0}}, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/211, 0xd3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10000, &(0x7f00000007c0)={0x77359400}) 08:57:49 executing program 5: symlink(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='./file0\x00') lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.id\x00') 08:57:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000004500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x40}, 0x0) 08:57:49 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) 08:57:49 executing program 5: mremap(&(0x7f0000ff5000/0xa000)=nil, 0xa000, 0x3000, 0x4, &(0x7f0000ffd000/0x3000)=nil) 08:57:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20c342, 0x0) r1 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r1, 0x89e1, &(0x7f0000000480)={'lo\x00'}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000100)="0992803c021d593a02030e39034d61feedaffb3c28616a2f194b292d11f92d39dfb67062585c3771219f14a08797726aaea807aecd6b5402e886ebd7094f8a60f7b25401c20acf7581ee1c10f7bbf3c53cc1f4e76f142e09468525a9b761e7987609d7385935f3be853b70b40f09bc751ad9efa95f144ea66d8b365dc13f36f22e0ae2ad02988f45c975991ebf0475f5c106507801dd2612594f0111e5fd12a337f49a0ddb487c2510d8d62c110adb836469c459a70676d9c0da5a862476072b4e284757d90097d5f20ec5a9cbf79cadc05f45136a1e980a349529c1d284659daa1bf5eec52af9e175bd02e29010161f024c0277a3", 0xf5}], 0x1, 0xd) r2 = socket(0x2, 0x3, 0x7f) ioctl$sock_SIOCGIFINDEX(r2, 0x89e1, &(0x7f0000000480)={'lo\x00'}) bind(r2, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x3, @remote}}, 0x80) r3 = perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fsmount(r0, 0x1, 0x4) ioctl$FIONCLEX(r3, 0x5450) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000280)={0x6b0, 0x8, 0x56}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x9) 08:57:49 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:49 executing program 0: symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000080)='./file0\x00') name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@ceph_nfs_fh={0x8}, &(0x7f0000000140), 0x0) 08:57:49 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000067349"], 0x1c}}, 0x0) 08:57:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3823714ebb193c27dd59c8d8b232df4890479b77a2e58202e6413d2f681dd39faa6e56783d12b197b43cb1a139e3c03183b948b4500de6c3fe8e8cee47767fc1face543d38e29ce7c1f059a0baaae1aef5b0f87653b4920baf80b63935862ace99f408385217d7e4bc6259ad374bd86781433dcaae54c91236e4231ab60258ec8e2bae25099461e7197daf460b8222418a66839d59a32a0c6334b99485b9a4c2f9cd274a0f984a2ce4cbf08b45049f48eb3e8c7963a62de6b8b8a89f184191579425502da9f0cdc3471ea607dd9b5bfb6e156ec9ffe473ec60ac0c0cc9dd510b398b37461788f73d", @ANYBLOB="39445f8e259d034a0df1d240a86a484aa307a69bd5e4c4c1"]) 08:57:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x8, 0x26, 0x9, 0x1a, 0x0, 0xff, 0x10, 0xe, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x2000, 0x84cc, 0x10001, 0x4, 0x800, 0x227, 0xff01, 0x0, 0x9, 0x0, 0x800}, 0xffffffffffffffff, 0xf, r0, 0x8) 08:57:50 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) syz_io_uring_setup(0x7c05, &(0x7f0000000240)={0x0, 0xb6a8, 0x2e, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:50 executing program 2: r0 = io_uring_setup(0x14a8, &(0x7f0000000000)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0xcef9b000) 08:57:50 executing program 5: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x7000) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 08:57:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev}, @in6=@ipv4}}, 0xf0}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@hci, 0x80) 08:57:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=ANY=[@ANYBLOB="b0000000100001"], 0xf0}}, 0x0) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:50 executing program 2: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 08:57:50 executing program 5: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 08:57:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x4000, 0x8) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:50 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "8cc222a38d0f72e208e2af11c7fb3ea9008f63dce99f7c0c10ee8874b819c65f1ab21d5a5dcabd47c5e264478bf5f40571f79af0d10448e6d1fc05fdd3ab2bfb"}, 0x48, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 08:57:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 08:57:50 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lstat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) 08:57:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:50 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x0, 0x0, 0x0, 0xc, 0x0, 0xffff}}) 08:57:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="10f2"], 0x0, 0x0) 08:57:50 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3f, 0x4, 0xcb, 0xf8, 0x0, 0x7b14, 0xd47550ab9a96fee6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7f, 0x80}, 0x12a10, 0x966, 0x81, 0x9, 0x1, 0x101, 0x3ff, 0x0, 0x4, 0x0, 0x1dab8db1}, 0x0, 0x1, 0xffffffffffffffff, 0xb) 08:57:50 executing program 2: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x71) 08:57:50 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x26c00, 0x0) 08:57:50 executing program 5: request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='logon\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "8cc222a38d0f72e208e2af11c7fb3ea9008f63dce99f7c0c10ee8874b819c65f1ab21d5a5dcabd47c5e264478bf5f40571f79af0d10448e6d1fc05fdd3ab2bfb"}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\x00', 0x0) 08:57:50 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'user.', 'overlay\x00'}, 0x0, 0x0) [ 1218.166518][T24850] rtc_cmos 00:00: Alarms can be up to one day in the future 08:57:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "8cda55bff3c6df7168c43c44cd6dd2792b0e88a9b26defa38103dd09000000016c2fe658eaa52a0edf1aee7809c25ac885e2a3769bf496d4d42953d59aa3c126"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r1, r2) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:50 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x7, &(0x7f0000002440)=[{&(0x7f0000000140)="82e8452aabede1c3dc88d5d9f274af6cbb791d80431825b745a28c451c8aef3a453fa34962319862c6b10d498a352c0cfaf6b4b842bce9d503ee238ab42db8b31f3c0ea1117d8255dd590d081051c5960f44eb5dcd284084553827358ac94437b165fd04720ff458f3df955edba1cb184dc37b277369ae0b4e87225b519674cf07178399b4", 0x85, 0x40}, {&(0x7f0000000200)="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", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000001200)="3b050a9da59a02e6cc4964ddac0babed608a3d4d65038ca532b5d91a54ae79d18971a2c5cdb057fae254d83f32683b379abc8f5941a776c77765316a5b13af1b38d4ef6ecbef8adc1e2e8b4dc65a8b19", 0x50, 0x4}, {&(0x7f0000001280)="876f6f3b59e5a7af7b5f05f13f2e9124ba0f223d7a91358eeca061a6564479962a99e39765b32d1d752e9022dca2349cfca176cf6e1d88c8a55cf4", 0x3b, 0x9c2}, {&(0x7f00000012c0)="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", 0x1000, 0x401}, {&(0x7f00000022c0)="3be00166e7899163cdc668888a05b3e381d9a018e1d3d7451f2dfe64421f167ba10a9abc28905f1a593738b2d786cd6b265eb25c7fd934679f7f796ab37d64cfba25f27b8e5a151859fad4ce0744e5e1cf5a3e39a73f6d7a87670a875ef0a9225870205ced2271c273267b1fd9e5075642c28507897f996e66080f8333fc06fb27a840ab3780324834b605dcab78f0c18ff728ff1a4614634faefeed462205b3f109804447b5052abd0283b8caabf6b6879776cc69b4e64b2fa1132ec9790454a037d225314f78cf440eec6e7d38282233036a24d136c21c7d9b311d4efaf72a5c5d6839391e5bf045048a095c22edbc785b", 0xf2, 0x5}, {&(0x7f00000023c0)="b730358186ae05f1267cc55179e6359374daf8f7464915c6b4c0ff80fad1e416f73b3dbfc9bb918c3f7a750582ce4ef3f409e87cd9493dd4165ed929895c390ef2ed8ea8d01e", 0x46, 0x1}], 0x4400, &(0x7f0000002500)={[{@noquota}, {@sb={'sb', 0x3d, 0xd7}}, {@nobh}, {@nojournal_checksum}, {@sb={'sb', 0x3d, 0x2}}], [{@uid_lt}, {@dont_appraise}, {@context={'context', 0x3d, 'sysadm_u'}}, {@obj_role}]}) readlinkat(r0, &(0x7f00000025c0)='./file0\x00', &(0x7f0000002600)=""/161, 0xa1) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:50 executing program 1: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 08:57:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000580)={&(0x7f0000000040), 0xc, &(0x7f0000000500)={0x0}}, 0x0) 08:57:50 executing program 0: perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:50 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, 0x0) 08:57:50 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:50 executing program 0: r0 = syz_io_uring_setup(0x714d, &(0x7f00000000c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000140), &(0x7f0000000180)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0x13, r0, 0x0) [ 1218.288536][T24882] loop3: detected capacity change from 0 to 16383 [ 1218.328680][T24882] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 08:57:50 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003cc0)={[{@uid={'uid', 0x3d, 0xee01}}, {@size={'size', 0x3d, [0x36, 0x0]}}]}) 08:57:50 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1401}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1218.399667][T24882] loop3: detected capacity change from 0 to 16383 08:57:50 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000200)=@v2={0x2, @aes256, 0x10, '\x00', @a}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/205, 0xcd) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 08:57:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xcfb}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 08:57:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x11}, 0x0) 08:57:50 executing program 0: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d02}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:50 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:50 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 08:57:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x803e}, 0x0) 08:57:50 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:50 executing program 2: symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000080)='./file0\x00') symlinkat(&(0x7f0000000180)='./file0/file1/file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00') setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) 08:57:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140), 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 08:57:51 executing program 5: syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@random={'user.', '\x00'}, 0x0, 0x0) 08:57:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0) 08:57:51 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:51 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5452, &(0x7f0000000000)) 08:57:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:51 executing program 5: syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xc0}, 0x0) 08:57:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000080)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x5b0, 0x8, 0x0, 0x1, [{0x230, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x1f4, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}, {0x84, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x270, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @WGPEER_A_ALLOWEDIPS={0x150, 0x9, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @remote}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "05320797e3230acd52e72194f370825fc7e8b2807b86163af00e04a6488254e6"}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x8f8, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x2e8, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0e02253d05c47fdf36600e1496c1193de8bea9f4553a503cd248fabda3f08fc5"}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x234, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}]}, {0x3fc, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1ad519d8f1f5b91d829c1528629958973b400745fc636226edfd85f660e0468b"}, @WGPEER_A_ALLOWEDIPS={0x37c, 0x9, 0x0, 0x1, [{0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}]}, {0x1cc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0579b5bed1682641de63c9116177c3b36c0ece29eedf95b593fc979294634c2e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x17c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7cd3867061d8d9f6750b9d9418e440ece8d10b087b190f24876edffcce31f63a"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x1}, 0x0) 08:57:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002280)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:57:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000080)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x5ac, 0x8, 0x0, 0x1, [{0x230, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x1f4, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x270, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x9, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @WGPEER_A_ALLOWEDIPS={0x150, 0x9, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @remote}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "05320797e3230acd52e72194f370825fc7e8b2807b86163af00e04a6488254e6"}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x8f4, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x2e0, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0e02253d05c47fdf36600e1496c1193de8bea9f4553a503cd248fabda3f08fc5"}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x234, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}]}, {0x3fc, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1ad519d8f1f5b91d829c1528629958973b400745fc636226edfd85f660e0468b"}, @WGPEER_A_ALLOWEDIPS={0x37c, 0x9, 0x0, 0x1, [{0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}]}, {0x200, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0579b5bed1682641de63c9116177c3b36c0ece29eedf95b593fc979294634c2e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_ALLOWEDIPS={0x1b8, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8}]}, 0xec4}}, 0x0) 08:57:51 executing program 5: syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xc0) 08:57:51 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "8cc222a38d0f72e208e2af11c7fb3ea9008f63dce99f7c0c10ee8874b819c65f1ab21d5a5dcabd47c5e264478bf5f40571f79af0d10448e6d1fc05fdd3ab2bfb"}, 0xfffff, 0xfffffffffffffffe) 08:57:51 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 08:57:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0, 0x34000}}, 0x0) 08:57:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 08:57:51 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 08:57:51 executing program 2: symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000080)='./file0\x00') lstat(0x0, 0x0) chmod(&(0x7f0000000300)='./file0\x00', 0x0) getpid() 08:57:51 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x7000) syz_io_uring_setup(0x55a2, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 08:57:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:51 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xc000, 0x1) 08:57:51 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x803e0000}, 0x0) 08:57:51 executing program 0: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:57:51 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:57:51 executing program 2: syz_io_uring_setup(0x4fda, &(0x7f0000000180), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x2820, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1364, &(0x7f0000000380), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000400), 0x0) 08:57:51 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:51 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000003040)={0x14, r0, 0xf134e897e9b7fbc1}, 0x14}}, 0x0) 08:57:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 08:57:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000080)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x5ac, 0x8, 0x0, 0x1, [{0x230, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x1f4, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x270, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xb4, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @WGPEER_A_ALLOWEDIPS={0x150, 0x9, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @remote}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "05320797e3230acd52e72194f370825fc7e8b2807b86163af00e04a6488254e6"}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x8fc, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x2e0, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0e02253d05c47fdf36600e1496c1193de8bea9f4553a503cd248fabda3f08fc5"}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x234, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}]}, {0x3fc, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1ad519d8f1f5b91d829c1528629958973b400745fc636226edfd85f660e0468b"}, @WGPEER_A_ALLOWEDIPS={0x37c, 0x9, 0x0, 0x1, [{0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}]}, {0x208, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "0579b5bed1682641de63c9116177c3b36c0ece29eedf95b593fc979294634c2e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x1b8, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) 08:57:51 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:57:51 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x3e80}, 0x0) 08:57:51 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 08:57:51 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:51 executing program 2: syz_io_uring_setup(0x4fda, &(0x7f0000000180), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_setup(0x2820, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000280), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 08:57:51 executing program 0: madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) [ 1219.167761][T25081] 9pnet: p9_fd_create_tcp (25081): problem connecting socket to 127.0.0.1 08:57:51 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000004180)={&(0x7f0000002b40), 0xc, &(0x7f0000004340)={&(0x7f0000003040)={0x14, r0, 0xf134e897e9b7fbc1}, 0x14}}, 0x0) 08:57:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0xffffffffffffffff) 08:57:51 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:51 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCDELRT(r0, 0x541b, &(0x7f00000000c0)={0x0, @xdp, @ethernet={0x0, @broadcast}, @sco={0x1f, @none}}) 08:57:54 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:57:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f000000a480)={{0x14}, [@NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x101}], {0x14}}, 0x3c}}, 0x0) 08:57:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4803}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:54 executing program 0: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xcfb}, r0, 0x6, 0xffffffffffffffff, 0x0) 08:57:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000002dc0), 0x2004001, &(0x7f0000002e40)) 08:57:54 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x7000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 08:57:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:54 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000)="e673326858c5f54db7041425e69c3f58a94842014a65aac6a8fc7aff7d654d3706d95d35453863ba5e47b73d400dd8f657b2cd0852ae56a7db784e7b95469f434d5265b69b", 0x45, 0x89, &(0x7f00000001c0)={0xfffffd5f, 0x1c}, 0xb4) 08:57:54 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1222.182059][T25132] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 08:57:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1222.257002][T25132] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 08:57:54 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 08:57:54 executing program 3: setpriority(0x0, 0x3, 0x0) 08:57:54 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) fcntl$getown(r0, 0x5) 08:57:54 executing program 2: linkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, 0x0, 0x4000) 08:57:54 executing program 5: syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:54 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x308, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x2000) 08:57:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000001940)=[@cred], 0x20}, 0x0) 08:57:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:54 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:57:57 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:57:57 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x52, 0x0, 0x0) 08:57:57 executing program 5: syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:57 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x9) 08:57:57 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:57 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x19, &(0x7f0000000000)=""/2, &(0x7f0000000040)=0x2) 08:57:57 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 08:57:57 executing program 5: syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 08:57:57 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:57:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000d80)='./file0/file0\x00', 0x0, 0x1) 08:57:57 executing program 2: pipe(&(0x7f0000000340)) 08:57:57 executing program 0: chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 08:58:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:00 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000001940)}, 0x0) 08:58:00 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x20000, 0x0) 08:58:00 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 08:58:00 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/237, 0xed, 0x40, 0x0, 0x0) 08:58:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000440)='./file\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) execve(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000d80)='./file0/file0\x00', 0x0, 0x1) 08:58:00 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 08:58:00 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000240)={{}, {0x0, 0x3e75ad2f}}, 0x0) 08:58:00 executing program 3: r0 = socket(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000000c0), 0x0) 08:58:00 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000e40), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 08:58:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)=[@cred], 0x20}, 0x0) 08:58:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:03 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000180)=[{&(0x7f0000000080)='e', 0x1}, {0x0}, {0x0}], 0x3, &(0x7f00000001c0)=[@rights], 0x10}, 0x0) 08:58:03 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000040)={{0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}}) 08:58:03 executing program 5: r0 = socket(0x2, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:58:03 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 08:58:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000001940)=[@cred], 0x20}, 0x1) 08:58:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x8, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/237, 0xed, 0x0, 0x0, 0x0) 08:58:03 executing program 3: r0 = socket(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 08:58:03 executing program 0: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 08:58:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d03}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:03 executing program 5: mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 08:58:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:06 executing program 2: pipe2(0x0, 0x4ed72bc5a4b3f48e) 08:58:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) 08:58:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 08:58:06 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b80), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x38, 'wpan4\x00'}]}, 0x20}}, 0x0) 08:58:06 executing program 0: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 08:58:06 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x1, 0xee00}}) 08:58:06 executing program 5: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x1000113) 08:58:06 executing program 3: mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 08:58:06 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb401}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:06 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEV(r1, &(0x7f0000000bc0)={&(0x7f0000000a80), 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x14, r0, 0x1}, 0x14}}, 0x0) 08:58:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:09 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x1, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}) 08:58:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_origin(r0, 0x0, 0x0, 0x0, 0x0) 08:58:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x18, 0x0, &(0x7f0000000140)) 08:58:09 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd502}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:09 executing program 2: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000400)={0x10000000}) 08:58:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000000140)) 08:58:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[], 0x24}}, 0x0) 08:58:09 executing program 0: r0 = socket(0x2, 0x3, 0x8) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 08:58:09 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) 08:58:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000000)=0x1, 0x4) 08:58:09 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea02}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:12 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x1, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}) 08:58:12 executing program 3: r0 = getpid() wait4(r0, 0x0, 0x20000000, &(0x7f0000000080)) 08:58:12 executing program 2: mremap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0) 08:58:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}]}]}, 0x34}}, 0x0) 08:58:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefff}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:12 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, @nl=@unspec, @ax25={0x3, @bcast}, @xdp={0x2c, 0x0, 0x0, 0x7}, 0xfe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x64e}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 08:58:12 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 08:58:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fcntl$setown(r0, 0x6, 0x0) 08:58:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cdg\x00', 0x4) 08:58:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:12 executing program 5: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000580)=""/4088, 0xff8}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) ppoll(&(0x7f0000000500)=[{r0}], 0x1, &(0x7f0000000040)={0x9}, 0x0, 0x0) shutdown(r2, 0x0) 08:58:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:15 executing program 2: renameat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, 0x0) 08:58:15 executing program 3: symlinkat(&(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 08:58:15 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:15 executing program 0: r0 = socket(0x2, 0x3, 0x0) r1 = socket(0x1c, 0x10000001, 0x84) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000140)={0xf4ba, 0x4}, 0x8) dup2(r0, r1) 08:58:15 executing program 5: symlinkat(&(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0) 08:58:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getpriority(0x2, 0x0) 08:58:15 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:58:15 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffef}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:15 executing program 5: pipe2(&(0x7f0000000140), 0x0) 08:58:15 executing program 3: pipe2(&(0x7f0000000200), 0x0) 08:58:15 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=ANY=[], &(0x7f00000000c0), 0x0) 08:58:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0xa, @in=@loopback}}, 0xe8) 08:58:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:18 executing program 5: socketpair(0x1, 0x0, 0x5, &(0x7f0000000000)) 08:58:18 executing program 2: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)="e2234c3f5e169d978669fe0129fec2e051a195412f2cfb6840e7ee78529a99cde1a9d8d8e97431c42a7f097ee65008071c67ab715c4cd469009b6f7a972dccff206e7c7cd4d354276b67e2c0735da3546a38e19fcdbfb94bcb2bb5ab038f5008886b978f696c46ca192ead02e87299ca2d4960ebbb1f1b01072d18a3d2f7b4962fbcc9f532e0020372ac2019633e56b00d9e8a0fb2150252ca15ead4d6ac81c8501cd7b90a81a1e391c1947513966b22b36d131caee810239e3e27a05eb4885af59a802c531b6b9e148f8d5e454c421ef5b944164b2cd13681db45d65ab6dd", 0xfffffffffffffe7d) 08:58:18 executing program 0: socketpair(0x2, 0x5, 0x0, &(0x7f0000000340)) 08:58:18 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:18 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:18 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:18 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:18 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1246.578746][T25593] FAULT_INJECTION: forcing a failure. [ 1246.578746][T25593] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.591510][T25593] CPU: 0 PID: 25593 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1246.600313][T25593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.610365][T25593] Call Trace: [ 1246.613666][T25593] dump_stack_lvl+0xd6/0x122 [ 1246.618504][T25593] dump_stack+0x11/0x1b [ 1246.622658][T25593] should_fail+0x23c/0x250 [ 1246.627069][T25593] ? __se_sys_memfd_create+0xfb/0x390 [ 1246.632440][T25593] __should_failslab+0x81/0x90 [ 1246.637190][T25593] should_failslab+0x5/0x20 [ 1246.641710][T25593] __kmalloc+0x6f/0x350 [ 1246.645847][T25593] ? strnlen_user+0x137/0x1c0 [ 1246.650542][T25593] __se_sys_memfd_create+0xfb/0x390 [ 1246.655723][T25593] __x64_sys_memfd_create+0x2d/0x40 [ 1246.661008][T25593] do_syscall_64+0x44/0xa0 [ 1246.665424][T25593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1246.671412][T25593] RIP: 0033:0x4665f9 [ 1246.675294][T25593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.694981][T25593] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1246.703471][T25593] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1246.711423][T25593] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1246.719383][T25593] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff 08:58:19 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:19 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1246.727334][T25593] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1246.735286][T25593] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1246.790308][T25600] FAULT_INJECTION: forcing a failure. [ 1246.790308][T25600] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.803037][T25600] CPU: 0 PID: 25600 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1246.803606][T25603] FAULT_INJECTION: forcing a failure. [ 1246.803606][T25603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1246.811903][T25600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.811917][T25600] Call Trace: [ 1246.811925][T25600] dump_stack_lvl+0xd6/0x122 [ 1246.811951][T25600] dump_stack+0x11/0x1b [ 1246.846933][T25600] should_fail+0x23c/0x250 [ 1246.851377][T25600] ? __se_sys_memfd_create+0xfb/0x390 [ 1246.856848][T25600] __should_failslab+0x81/0x90 [ 1246.861600][T25600] should_failslab+0x5/0x20 [ 1246.866140][T25600] __kmalloc+0x6f/0x350 [ 1246.870280][T25600] ? strnlen_user+0x137/0x1c0 [ 1246.874954][T25600] __se_sys_memfd_create+0xfb/0x390 [ 1246.880139][T25600] __x64_sys_memfd_create+0x2d/0x40 [ 1246.885415][T25600] do_syscall_64+0x44/0xa0 [ 1246.889828][T25600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1246.895720][T25600] RIP: 0033:0x4665f9 [ 1246.899608][T25600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.919215][T25600] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1246.927660][T25600] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1246.935685][T25600] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1246.943644][T25600] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1246.951641][T25600] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1246.959683][T25600] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1246.967646][T25603] CPU: 1 PID: 25603 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1246.976564][T25603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.986626][T25603] Call Trace: [ 1246.989911][T25603] dump_stack_lvl+0xd6/0x122 [ 1246.994556][T25603] dump_stack+0x11/0x1b [ 1246.998800][T25603] should_fail+0x23c/0x250 [ 1247.003217][T25603] should_fail_usercopy+0x16/0x20 [ 1247.008240][T25603] _copy_from_user+0x1c/0xd0 [ 1247.012842][T25603] __se_sys_memfd_create+0x137/0x390 [ 1247.018137][T25603] __x64_sys_memfd_create+0x2d/0x40 [ 1247.023406][T25603] do_syscall_64+0x44/0xa0 [ 1247.027959][T25603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1247.033849][T25603] RIP: 0033:0x4665f9 [ 1247.037737][T25603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1247.057479][T25603] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1247.065881][T25603] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1247.073836][T25603] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1247.081797][T25603] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1247.089776][T25603] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1247.097900][T25603] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 08:58:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:21 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:21 executing program 3 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:21 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:21 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1249.501363][T25614] FAULT_INJECTION: forcing a failure. [ 1249.501363][T25614] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.514005][T25614] CPU: 1 PID: 25614 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1249.522774][T25614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1249.532842][T25614] Call Trace: [ 1249.536117][T25614] dump_stack_lvl+0xd6/0x122 [ 1249.540720][T25614] dump_stack+0x11/0x1b [ 1249.545017][T25614] should_fail+0x23c/0x250 [ 1249.549441][T25614] ? shmem_alloc_inode+0x22/0x30 [ 1249.554429][T25614] __should_failslab+0x81/0x90 [ 1249.556880][T25617] FAULT_INJECTION: forcing a failure. [ 1249.556880][T25617] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.559200][T25614] ? shmem_match+0xa0/0xa0 [ 1249.559225][T25614] should_failslab+0x5/0x20 [ 1249.580906][T25614] kmem_cache_alloc+0x4f/0x300 [ 1249.585716][T25614] ? shmem_match+0xa0/0xa0 [ 1249.590169][T25614] shmem_alloc_inode+0x22/0x30 [ 1249.594919][T25614] new_inode_pseudo+0x38/0x1c0 [ 1249.599726][T25614] new_inode+0x21/0x120 [ 1249.603890][T25614] shmem_get_inode+0xb7/0x4a0 [ 1249.608592][T25614] __shmem_file_setup+0xf1/0x1d0 [ 1249.613528][T25614] shmem_file_setup+0x37/0x40 [ 1249.618290][T25614] __se_sys_memfd_create+0x1eb/0x390 [ 1249.623642][T25614] __x64_sys_memfd_create+0x2d/0x40 [ 1249.628854][T25614] do_syscall_64+0x44/0xa0 [ 1249.633356][T25614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1249.639417][T25614] RIP: 0033:0x4665f9 [ 1249.643317][T25614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.664231][T25614] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1249.672735][T25614] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1249.680703][T25614] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1249.688659][T25614] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff 08:58:22 executing program 2 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:22 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1249.696625][T25614] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1249.704580][T25614] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1249.712544][T25617] CPU: 0 PID: 25617 Comm: syz-executor.3 Not tainted 5.15.0-rc1-syzkaller #0 [ 1249.721307][T25617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1249.731362][T25617] Call Trace: [ 1249.734641][T25617] dump_stack_lvl+0xd6/0x122 [ 1249.739234][T25617] dump_stack+0x11/0x1b [ 1249.743425][T25617] should_fail+0x23c/0x250 08:58:22 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1249.747882][T25617] ? __se_sys_memfd_create+0xfb/0x390 [ 1249.753378][T25617] __should_failslab+0x81/0x90 [ 1249.758217][T25617] should_failslab+0x5/0x20 [ 1249.762725][T25617] __kmalloc+0x6f/0x350 [ 1249.766883][T25617] ? strnlen_user+0x137/0x1c0 [ 1249.771522][T25622] FAULT_INJECTION: forcing a failure. [ 1249.771522][T25622] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1249.771655][T25617] __se_sys_memfd_create+0xfb/0x390 [ 1249.789941][T25617] __x64_sys_memfd_create+0x2d/0x40 [ 1249.795138][T25617] do_syscall_64+0x44/0xa0 [ 1249.799552][T25617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1249.805450][T25617] RIP: 0033:0x4665f9 [ 1249.809326][T25617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.828918][T25617] RSP: 002b:00007f986978cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1249.837314][T25617] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1249.845273][T25617] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1249.853230][T25617] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1249.861185][T25617] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1249.869140][T25617] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1249.877101][T25622] CPU: 1 PID: 25622 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1249.885952][T25622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1249.896004][T25622] Call Trace: [ 1249.896204][T25633] FAULT_INJECTION: forcing a failure. [ 1249.896204][T25633] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.899360][T25622] dump_stack_lvl+0xd6/0x122 [ 1249.917623][T25622] dump_stack+0x11/0x1b [ 1249.921925][T25622] should_fail+0x23c/0x250 [ 1249.926328][T25622] should_fail_usercopy+0x16/0x20 [ 1249.931336][T25622] _copy_from_user+0x1c/0xd0 [ 1249.935968][T25622] __se_sys_memfd_create+0x137/0x390 [ 1249.941242][T25622] __x64_sys_memfd_create+0x2d/0x40 [ 1249.946434][T25622] do_syscall_64+0x44/0xa0 [ 1249.950863][T25622] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1249.956750][T25622] RIP: 0033:0x4665f9 [ 1249.960629][T25622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.980420][T25622] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1249.988816][T25622] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1249.996773][T25622] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1250.004844][T25622] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1250.012801][T25622] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1250.020756][T25622] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1250.028716][T25633] CPU: 0 PID: 25633 Comm: syz-executor.2 Not tainted 5.15.0-rc1-syzkaller #0 [ 1250.037477][T25633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.045444][T25634] FAULT_INJECTION: forcing a failure. [ 1250.045444][T25634] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.047584][T25633] Call Trace: [ 1250.047592][T25633] dump_stack_lvl+0xd6/0x122 [ 1250.068089][T25633] dump_stack+0x11/0x1b [ 1250.072239][T25633] should_fail+0x23c/0x250 [ 1250.076639][T25633] ? __se_sys_memfd_create+0xfb/0x390 [ 1250.082035][T25633] __should_failslab+0x81/0x90 [ 1250.086805][T25633] should_failslab+0x5/0x20 [ 1250.091314][T25633] __kmalloc+0x6f/0x350 [ 1250.095454][T25633] ? strnlen_user+0x137/0x1c0 [ 1250.100220][T25633] __se_sys_memfd_create+0xfb/0x390 [ 1250.105403][T25633] __x64_sys_memfd_create+0x2d/0x40 [ 1250.110660][T25633] do_syscall_64+0x44/0xa0 [ 1250.115235][T25633] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1250.121171][T25633] RIP: 0033:0x4665f9 [ 1250.125050][T25633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.144641][T25633] RSP: 002b:00007f0017a9bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1250.153307][T25633] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1250.161473][T25633] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1250.169436][T25633] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1250.177752][T25633] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1250.185711][T25633] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1250.193685][T25634] CPU: 1 PID: 25634 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1250.202448][T25634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.212590][T25634] Call Trace: [ 1250.215868][T25634] dump_stack_lvl+0xd6/0x122 [ 1250.220466][T25634] dump_stack+0x11/0x1b [ 1250.224704][T25634] should_fail+0x23c/0x250 [ 1250.229120][T25634] ? security_inode_alloc+0x30/0x180 [ 1250.234400][T25634] __should_failslab+0x81/0x90 [ 1250.239169][T25634] should_failslab+0x5/0x20 [ 1250.243675][T25634] kmem_cache_alloc+0x4f/0x300 [ 1250.248535][T25634] security_inode_alloc+0x30/0x180 08:58:22 executing program 2 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:22 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:22 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:22 executing program 3 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1250.253645][T25634] inode_init_always+0x20d/0x440 [ 1250.258644][T25634] ? shmem_match+0xa0/0xa0 [ 1250.263132][T25634] new_inode_pseudo+0x73/0x1c0 [ 1250.267915][T25634] new_inode+0x21/0x120 [ 1250.272150][T25634] shmem_get_inode+0xb7/0x4a0 [ 1250.276828][T25634] __shmem_file_setup+0xf1/0x1d0 [ 1250.281916][T25634] shmem_file_setup+0x37/0x40 [ 1250.286597][T25634] __se_sys_memfd_create+0x1eb/0x390 [ 1250.291890][T25634] __x64_sys_memfd_create+0x2d/0x40 [ 1250.297084][T25634] do_syscall_64+0x44/0xa0 [ 1250.301549][T25634] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1250.307454][T25634] RIP: 0033:0x4665f9 [ 1250.311343][T25634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.322295][T25650] FAULT_INJECTION: forcing a failure. [ 1250.322295][T25650] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.330975][T25634] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1250.330998][T25634] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1250.331011][T25634] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1250.367836][T25634] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1250.375823][T25634] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1250.383833][T25634] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1250.391850][T25650] CPU: 0 PID: 25650 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1250.400611][T25650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.410839][T25650] Call Trace: [ 1250.414282][T25650] dump_stack_lvl+0xd6/0x122 [ 1250.415154][T25647] FAULT_INJECTION: forcing a failure. [ 1250.415154][T25647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1250.418897][T25650] dump_stack+0x11/0x1b [ 1250.418927][T25650] should_fail+0x23c/0x250 [ 1250.418951][T25650] ? shmem_alloc_inode+0x22/0x30 [ 1250.445402][T25650] __should_failslab+0x81/0x90 [ 1250.450318][T25650] ? shmem_match+0xa0/0xa0 [ 1250.454721][T25650] should_failslab+0x5/0x20 [ 1250.459214][T25650] kmem_cache_alloc+0x4f/0x300 [ 1250.463972][T25650] ? shmem_match+0xa0/0xa0 [ 1250.468555][T25650] shmem_alloc_inode+0x22/0x30 [ 1250.473374][T25650] new_inode_pseudo+0x38/0x1c0 [ 1250.478131][T25650] new_inode+0x21/0x120 [ 1250.482292][T25650] shmem_get_inode+0xb7/0x4a0 [ 1250.486970][T25650] __shmem_file_setup+0xf1/0x1d0 [ 1250.491900][T25650] shmem_file_setup+0x37/0x40 [ 1250.496567][T25650] __se_sys_memfd_create+0x1eb/0x390 [ 1250.501890][T25650] __x64_sys_memfd_create+0x2d/0x40 [ 1250.507135][T25650] do_syscall_64+0x44/0xa0 [ 1250.511571][T25650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1250.517490][T25650] RIP: 0033:0x4665f9 [ 1250.521369][T25650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.541080][T25650] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1250.549476][T25650] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1250.558733][T25650] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1250.566836][T25650] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1250.574967][T25650] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1250.582922][T25650] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1250.590888][T25647] CPU: 1 PID: 25647 Comm: syz-executor.3 Not tainted 5.15.0-rc1-syzkaller #0 [ 1250.599761][T25647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.609831][T25647] Call Trace: [ 1250.613103][T25647] dump_stack_lvl+0xd6/0x122 [ 1250.617698][T25647] dump_stack+0x11/0x1b [ 1250.621860][T25647] should_fail+0x23c/0x250 [ 1250.626328][T25647] should_fail_usercopy+0x16/0x20 [ 1250.631423][T25647] _copy_from_user+0x1c/0xd0 [ 1250.636044][T25647] __se_sys_memfd_create+0x137/0x390 [ 1250.641368][T25647] __x64_sys_memfd_create+0x2d/0x40 [ 1250.643322][T25649] FAULT_INJECTION: forcing a failure. [ 1250.643322][T25649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1250.646567][T25647] do_syscall_64+0x44/0xa0 [ 1250.646597][T25647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1250.670046][T25647] RIP: 0033:0x4665f9 [ 1250.673936][T25647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.693594][T25647] RSP: 002b:00007f986978cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1250.701994][T25647] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1250.710035][T25647] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1250.717989][T25647] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1250.726013][T25647] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1250.734027][T25647] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1250.742013][T25649] CPU: 0 PID: 25649 Comm: syz-executor.2 Not tainted 5.15.0-rc1-syzkaller #0 [ 1250.750781][T25649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.760825][T25649] Call Trace: [ 1250.764100][T25649] dump_stack_lvl+0xd6/0x122 [ 1250.768695][T25649] dump_stack+0x11/0x1b [ 1250.772854][T25649] should_fail+0x23c/0x250 [ 1250.777285][T25649] should_fail_usercopy+0x16/0x20 [ 1250.782399][T25649] _copy_from_user+0x1c/0xd0 [ 1250.786995][T25649] __se_sys_memfd_create+0x137/0x390 [ 1250.792467][T25649] __x64_sys_memfd_create+0x2d/0x40 [ 1250.797751][T25649] do_syscall_64+0x44/0xa0 [ 1250.802162][T25649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1250.808136][T25649] RIP: 0033:0x4665f9 [ 1250.812009][T25649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.832139][T25649] RSP: 002b:00007f0017a9bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1250.840541][T25649] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1250.848493][T25649] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1250.856534][T25649] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1250.864829][T25649] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1250.872787][T25649] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 08:58:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:24 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:24 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:24 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:24 executing program 3 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:24 executing program 2 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1252.546126][T25669] FAULT_INJECTION: forcing a failure. [ 1252.546126][T25669] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.548605][T25667] FAULT_INJECTION: forcing a failure. [ 1252.548605][T25667] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.558864][T25669] CPU: 1 PID: 25669 Comm: syz-executor.3 Not tainted 5.15.0-rc1-syzkaller #0 [ 1252.580264][T25669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.590445][T25669] Call Trace: [ 1252.593721][T25669] dump_stack_lvl+0xd6/0x122 [ 1252.598308][T25669] dump_stack+0x11/0x1b [ 1252.602470][T25669] should_fail+0x23c/0x250 [ 1252.606875][T25669] ? shmem_alloc_inode+0x22/0x30 [ 1252.611813][T25669] __should_failslab+0x81/0x90 [ 1252.616571][T25669] ? shmem_match+0xa0/0xa0 [ 1252.620983][T25669] should_failslab+0x5/0x20 [ 1252.625480][T25669] kmem_cache_alloc+0x4f/0x300 [ 1252.630236][T25669] ? shmem_match+0xa0/0xa0 [ 1252.634650][T25669] shmem_alloc_inode+0x22/0x30 [ 1252.639424][T25669] new_inode_pseudo+0x38/0x1c0 [ 1252.644195][T25669] new_inode+0x21/0x120 [ 1252.648356][T25669] shmem_get_inode+0xb7/0x4a0 [ 1252.653032][T25669] __shmem_file_setup+0xf1/0x1d0 [ 1252.657999][T25669] shmem_file_setup+0x37/0x40 [ 1252.662672][T25669] __se_sys_memfd_create+0x1eb/0x390 [ 1252.667958][T25669] __x64_sys_memfd_create+0x2d/0x40 [ 1252.673263][T25669] do_syscall_64+0x44/0xa0 [ 1252.677684][T25669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1252.683691][T25669] RIP: 0033:0x4665f9 [ 1252.687603][T25669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1252.707289][T25669] RSP: 002b:00007f986978cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1252.715725][T25669] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1252.723701][T25669] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1252.731794][T25669] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1252.739844][T25669] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1252.748747][T25669] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1252.756727][T25667] CPU: 0 PID: 25667 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1252.765556][T25667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.775708][T25667] Call Trace: [ 1252.776944][T25670] FAULT_INJECTION: forcing a failure. [ 1252.776944][T25670] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.779010][T25667] dump_stack_lvl+0xd6/0x122 [ 1252.779035][T25667] dump_stack+0x11/0x1b [ 1252.779055][T25667] should_fail+0x23c/0x250 [ 1252.804956][T25667] ? security_inode_alloc+0x30/0x180 [ 1252.810417][T25667] __should_failslab+0x81/0x90 [ 1252.815290][T25667] should_failslab+0x5/0x20 [ 1252.819791][T25667] kmem_cache_alloc+0x4f/0x300 [ 1252.824633][T25667] security_inode_alloc+0x30/0x180 [ 1252.829877][T25667] inode_init_always+0x20d/0x440 [ 1252.834813][T25667] ? shmem_match+0xa0/0xa0 [ 1252.839512][T25667] new_inode_pseudo+0x73/0x1c0 [ 1252.844326][T25667] new_inode+0x21/0x120 [ 1252.848601][T25667] shmem_get_inode+0xb7/0x4a0 [ 1252.853472][T25667] __shmem_file_setup+0xf1/0x1d0 [ 1252.858416][T25667] shmem_file_setup+0x37/0x40 [ 1252.863176][T25667] __se_sys_memfd_create+0x1eb/0x390 [ 1252.868543][T25667] __x64_sys_memfd_create+0x2d/0x40 [ 1252.873782][T25667] do_syscall_64+0x44/0xa0 [ 1252.878204][T25667] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1252.884096][T25667] RIP: 0033:0x4665f9 [ 1252.887980][T25667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1252.907633][T25667] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1252.916302][T25667] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1252.924290][T25667] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1252.932257][T25667] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff 08:58:25 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1252.940318][T25667] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1252.948366][T25667] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1252.956343][T25670] CPU: 1 PID: 25670 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1252.965549][T25670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.975508][T25672] FAULT_INJECTION: forcing a failure. [ 1252.975508][T25672] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.975657][T25670] Call Trace: [ 1252.975665][T25670] dump_stack_lvl+0xd6/0x122 [ 1252.996176][T25670] dump_stack+0x11/0x1b [ 1253.000341][T25670] should_fail+0x23c/0x250 [ 1253.004770][T25670] ? __d_alloc+0x36/0x370 [ 1253.009096][T25670] __should_failslab+0x81/0x90 [ 1253.013853][T25670] should_failslab+0x5/0x20 [ 1253.018380][T25670] kmem_cache_alloc+0x4f/0x300 [ 1253.023139][T25670] __d_alloc+0x36/0x370 [ 1253.027294][T25670] d_alloc_pseudo+0x1a/0x50 [ 1253.031793][T25670] alloc_file_pseudo+0x77/0x150 [ 1253.036772][T25670] __shmem_file_setup+0x14c/0x1d0 [ 1253.041970][T25670] shmem_file_setup+0x37/0x40 [ 1253.046703][T25670] __se_sys_memfd_create+0x1eb/0x390 [ 1253.051981][T25670] __x64_sys_memfd_create+0x2d/0x40 [ 1253.057172][T25670] do_syscall_64+0x44/0xa0 [ 1253.061664][T25670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1253.067559][T25670] RIP: 0033:0x4665f9 [ 1253.071442][T25670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.091193][T25670] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1253.099602][T25670] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1253.107570][T25670] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1253.115681][T25670] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1253.123689][T25670] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1253.131658][T25670] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1253.139700][T25672] CPU: 0 PID: 25672 Comm: syz-executor.2 Not tainted 5.15.0-rc1-syzkaller #0 [ 1253.148474][T25672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.158578][T25672] Call Trace: [ 1253.162059][T25672] dump_stack_lvl+0xd6/0x122 [ 1253.166765][T25672] dump_stack+0x11/0x1b [ 1253.170950][T25672] should_fail+0x23c/0x250 [ 1253.175378][T25672] ? shmem_alloc_inode+0x22/0x30 [ 1253.180331][T25672] __should_failslab+0x81/0x90 [ 1253.185162][T25672] ? shmem_match+0xa0/0xa0 [ 1253.189588][T25672] should_failslab+0x5/0x20 [ 1253.194098][T25672] kmem_cache_alloc+0x4f/0x300 [ 1253.198888][T25672] ? shmem_match+0xa0/0xa0 [ 1253.203371][T25672] shmem_alloc_inode+0x22/0x30 [ 1253.208158][T25672] new_inode_pseudo+0x38/0x1c0 [ 1253.213040][T25672] new_inode+0x21/0x120 [ 1253.217287][T25672] shmem_get_inode+0xb7/0x4a0 [ 1253.221986][T25672] __shmem_file_setup+0xf1/0x1d0 [ 1253.227049][T25672] shmem_file_setup+0x37/0x40 [ 1253.231731][T25672] __se_sys_memfd_create+0x1eb/0x390 [ 1253.235969][T25683] FAULT_INJECTION: forcing a failure. [ 1253.235969][T25683] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.237287][T25672] __x64_sys_memfd_create+0x2d/0x40 [ 1253.237312][T25672] do_syscall_64+0x44/0xa0 [ 1253.259448][T25672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1253.265438][T25672] RIP: 0033:0x4665f9 [ 1253.269437][T25672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.289252][T25672] RSP: 002b:00007f0017a9bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 08:58:25 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:25 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:25 executing program 3 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:25 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1253.298176][T25672] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1253.307218][T25672] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1253.315614][T25672] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1253.323662][T25672] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1253.331629][T25672] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1253.339620][T25683] CPU: 1 PID: 25683 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1253.348430][T25683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.358558][T25683] Call Trace: [ 1253.361854][T25683] dump_stack_lvl+0xd6/0x122 [ 1253.366498][T25683] dump_stack+0x11/0x1b [ 1253.370779][T25683] should_fail+0x23c/0x250 [ 1253.375212][T25683] ? __alloc_file+0x2e/0x1a0 [ 1253.379870][T25683] __should_failslab+0x81/0x90 [ 1253.382890][T25686] FAULT_INJECTION: forcing a failure. [ 1253.382890][T25686] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.384807][T25683] should_failslab+0x5/0x20 [ 1253.402012][T25683] kmem_cache_alloc+0x4f/0x300 [ 1253.406781][T25683] __alloc_file+0x2e/0x1a0 [ 1253.411262][T25683] alloc_empty_file+0xcd/0x1c0 [ 1253.416086][T25683] alloc_file+0x3a/0x280 [ 1253.420848][T25683] alloc_file_pseudo+0xfa/0x150 [ 1253.425784][T25683] __shmem_file_setup+0x14c/0x1d0 [ 1253.430802][T25683] shmem_file_setup+0x37/0x40 [ 1253.435470][T25683] __se_sys_memfd_create+0x1eb/0x390 [ 1253.440921][T25683] __x64_sys_memfd_create+0x2d/0x40 [ 1253.446223][T25683] do_syscall_64+0x44/0xa0 [ 1253.450730][T25683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1253.456666][T25683] RIP: 0033:0x4665f9 [ 1253.460554][T25683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.480239][T25683] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1253.488794][T25683] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1253.496755][T25683] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1253.504758][T25683] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1253.512820][T25683] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1253.520981][T25683] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1253.529473][T25686] CPU: 0 PID: 25686 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1253.538358][T25686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.548416][T25686] Call Trace: [ 1253.551703][T25686] dump_stack_lvl+0xd6/0x122 [ 1253.556394][T25686] dump_stack+0x11/0x1b [ 1253.560633][T25686] should_fail+0x23c/0x250 [ 1253.565056][T25686] ? __d_alloc+0x36/0x370 [ 1253.569399][T25686] __should_failslab+0x81/0x90 [ 1253.574215][T25686] should_failslab+0x5/0x20 [ 1253.578730][T25686] kmem_cache_alloc+0x4f/0x300 [ 1253.583503][T25686] __d_alloc+0x36/0x370 [ 1253.587671][T25686] d_alloc_pseudo+0x1a/0x50 [ 1253.592181][T25686] alloc_file_pseudo+0x77/0x150 [ 1253.592598][T25684] FAULT_INJECTION: forcing a failure. [ 1253.592598][T25684] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.597206][T25686] __shmem_file_setup+0x14c/0x1d0 [ 1253.615268][T25686] shmem_file_setup+0x37/0x40 [ 1253.620029][T25686] __se_sys_memfd_create+0x1eb/0x390 [ 1253.625398][T25686] __x64_sys_memfd_create+0x2d/0x40 [ 1253.630832][T25686] do_syscall_64+0x44/0xa0 [ 1253.635249][T25686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1253.641323][T25686] RIP: 0033:0x4665f9 [ 1253.645573][T25686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.665460][T25686] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1253.673873][T25686] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1253.682047][T25686] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1253.690050][T25686] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff 08:58:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:25 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1253.698010][T25686] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1253.706060][T25686] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1253.714199][T25684] CPU: 1 PID: 25684 Comm: syz-executor.3 Not tainted 5.15.0-rc1-syzkaller #0 [ 1253.723119][T25684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.733358][T25684] Call Trace: [ 1253.736638][T25684] dump_stack_lvl+0xd6/0x122 [ 1253.741248][T25684] dump_stack+0x11/0x1b [ 1253.745596][T25684] should_fail+0x23c/0x250 [ 1253.750056][T25684] ? security_inode_alloc+0x30/0x180 [ 1253.755357][T25684] __should_failslab+0x81/0x90 [ 1253.760198][T25684] should_failslab+0x5/0x20 [ 1253.764719][T25684] kmem_cache_alloc+0x4f/0x300 [ 1253.769493][T25684] security_inode_alloc+0x30/0x180 [ 1253.774622][T25684] inode_init_always+0x20d/0x440 [ 1253.779572][T25684] ? shmem_match+0xa0/0xa0 [ 1253.784480][T25684] new_inode_pseudo+0x73/0x1c0 [ 1253.789347][T25684] new_inode+0x21/0x120 [ 1253.793519][T25684] shmem_get_inode+0xb7/0x4a0 08:58:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:26 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:26 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:26 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1253.798276][T25684] __shmem_file_setup+0xf1/0x1d0 [ 1253.803291][T25684] shmem_file_setup+0x37/0x40 [ 1253.808068][T25684] __se_sys_memfd_create+0x1eb/0x390 [ 1253.813392][T25684] __x64_sys_memfd_create+0x2d/0x40 [ 1253.818597][T25684] do_syscall_64+0x44/0xa0 [ 1253.823021][T25684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1253.829087][T25684] RIP: 0033:0x4665f9 [ 1253.833005][T25684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.852833][T25684] RSP: 002b:00007f986978cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1253.858671][T25715] FAULT_INJECTION: forcing a failure. [ 1253.858671][T25715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1253.861409][T25684] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1253.882661][T25684] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1253.890659][T25684] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1253.898627][T25684] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1253.906587][T25684] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1253.914690][T25715] CPU: 0 PID: 25715 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1253.923504][T25715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.927581][T25717] FAULT_INJECTION: forcing a failure. [ 1253.927581][T25717] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.933659][T25715] Call Trace: [ 1253.933668][T25715] dump_stack_lvl+0xd6/0x122 [ 1253.954840][T25715] dump_stack+0x11/0x1b [ 1253.959059][T25715] should_fail+0x23c/0x250 [ 1253.963471][T25715] __alloc_pages+0x102/0x320 [ 1253.968061][T25715] kmem_getpages+0x1a/0xd0 [ 1253.972495][T25715] cache_grow_begin+0x4c/0x1a0 [ 1253.977354][T25715] cache_alloc_refill+0x326/0x3d0 [ 1253.982586][T25715] ? should_fail+0xd6/0x250 [ 1253.987174][T25715] ? __d_alloc+0x36/0x370 [ 1253.991506][T25715] kmem_cache_alloc+0x278/0x300 [ 1253.996499][T25715] ? __d_alloc+0x36/0x370 [ 1254.000915][T25715] __d_alloc+0x36/0x370 [ 1254.005079][T25715] d_alloc_pseudo+0x1a/0x50 [ 1254.009671][T25715] alloc_file_pseudo+0x77/0x150 [ 1254.014760][T25715] __shmem_file_setup+0x14c/0x1d0 [ 1254.019939][T25715] shmem_file_setup+0x37/0x40 [ 1254.024868][T25715] __se_sys_memfd_create+0x1eb/0x390 [ 1254.030169][T25715] __x64_sys_memfd_create+0x2d/0x40 [ 1254.035457][T25715] do_syscall_64+0x44/0xa0 [ 1254.039881][T25715] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.045845][T25715] RIP: 0033:0x4665f9 [ 1254.049728][T25715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.069470][T25715] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1254.077894][T25715] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1254.085950][T25715] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1254.094016][T25715] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1254.102094][T25715] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1254.110055][T25715] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1254.118093][T25717] CPU: 1 PID: 25717 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1254.123501][T25715] loop5: detected capacity change from 0 to 264192 [ 1254.126857][T25717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.143488][T25717] Call Trace: [ 1254.146836][T25717] dump_stack_lvl+0xd6/0x122 08:58:26 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1254.151435][T25717] dump_stack+0x11/0x1b [ 1254.155736][T25717] should_fail+0x23c/0x250 [ 1254.160296][T25717] ? security_file_alloc+0x30/0x190 [ 1254.165506][T25717] __should_failslab+0x81/0x90 [ 1254.170277][T25717] should_failslab+0x5/0x20 [ 1254.174806][T25717] kmem_cache_alloc+0x4f/0x300 [ 1254.179664][T25717] security_file_alloc+0x30/0x190 [ 1254.184703][T25717] __alloc_file+0x83/0x1a0 [ 1254.189134][T25717] alloc_empty_file+0xcd/0x1c0 [ 1254.193918][T25717] alloc_file+0x3a/0x280 [ 1254.198196][T25717] alloc_file_pseudo+0xfa/0x150 [ 1254.203102][T25717] __shmem_file_setup+0x14c/0x1d0 [ 1254.208611][T25717] shmem_file_setup+0x37/0x40 [ 1254.213309][T25717] __se_sys_memfd_create+0x1eb/0x390 [ 1254.218605][T25717] __x64_sys_memfd_create+0x2d/0x40 [ 1254.220704][T25714] loop2: detected capacity change from 0 to 264192 [ 1254.223811][T25717] do_syscall_64+0x44/0xa0 [ 1254.234703][T25717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.240622][T25717] RIP: 0033:0x4665f9 [ 1254.244517][T25717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.264292][T25717] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1254.272719][T25717] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1254.280707][T25717] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1254.288669][T25717] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff 08:58:26 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1254.296631][T25717] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1254.304607][T25717] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1254.317157][T25715] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1254.339207][T25715] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 08:58:26 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1254.350983][T25715] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1254.360027][T25734] loop3: detected capacity change from 0 to 264192 [ 1254.380501][T25714] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1254.388968][T25742] FAULT_INJECTION: forcing a failure. [ 1254.388968][T25742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1254.392026][T25714] EXT4-fs (loop2): get root inode failed [ 1254.405223][T25742] CPU: 0 PID: 25742 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1254.410837][T25714] EXT4-fs (loop2): mount failed [ 1254.419564][T25742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.419577][T25742] Call Trace: [ 1254.419584][T25742] dump_stack_lvl+0xd6/0x122 [ 1254.442635][T25742] dump_stack+0x11/0x1b [ 1254.446883][T25742] should_fail+0x23c/0x250 [ 1254.452033][T25742] __alloc_pages+0x102/0x320 [ 1254.456664][T25742] alloc_pages_vma+0x5ee/0x770 [ 1254.461438][T25742] shmem_getpage_gfp+0x96d/0x13d0 [ 1254.466485][T25742] ? policydb_context_isvalid+0x135/0x230 [ 1254.472243][T25742] shmem_write_begin+0x7e/0x100 [ 1254.477091][T25742] generic_perform_write+0x1b8/0x3e0 [ 1254.482383][T25742] __generic_file_write_iter+0x174/0x310 [ 1254.488037][T25742] generic_file_write_iter+0x75/0x130 [ 1254.493410][T25742] vfs_write+0x79c/0x8d0 [ 1254.497652][T25742] __x64_sys_pwrite64+0xf5/0x150 [ 1254.502591][T25742] do_syscall_64+0x44/0xa0 [ 1254.507129][T25742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.513036][T25742] RIP: 0033:0x419797 [ 1254.516934][T25742] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1254.536542][T25742] RSP: 002b:00007f1e348c5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1254.544983][T25742] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1254.552951][T25742] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 1254.561473][T25742] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1254.569651][T25742] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1254.577619][T25742] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 08:58:27 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:27 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:27 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1254.596287][T25734] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1254.623616][T25742] loop0: detected capacity change from 0 to 264192 [ 1254.632133][T25742] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1254.662264][T25734] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1254.687234][T25734] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1254.698452][T25761] FAULT_INJECTION: forcing a failure. [ 1254.698452][T25761] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.711329][T25761] CPU: 0 PID: 25761 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1254.720394][T25761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.730723][T25761] Call Trace: [ 1254.734008][T25761] dump_stack_lvl+0xd6/0x122 [ 1254.738616][T25761] dump_stack+0x11/0x1b [ 1254.742796][T25761] should_fail+0x23c/0x250 [ 1254.747235][T25761] ? security_file_alloc+0x30/0x190 [ 1254.752617][T25761] __should_failslab+0x81/0x90 [ 1254.757405][T25761] should_failslab+0x5/0x20 [ 1254.758326][T25766] loop2: detected capacity change from 0 to 264192 [ 1254.762023][T25761] kmem_cache_alloc+0x4f/0x300 [ 1254.762050][T25761] security_file_alloc+0x30/0x190 [ 1254.778408][T25761] __alloc_file+0x83/0x1a0 [ 1254.782841][T25761] alloc_empty_file+0xcd/0x1c0 [ 1254.787937][T25761] alloc_file+0x3a/0x280 [ 1254.792255][T25761] alloc_file_pseudo+0xfa/0x150 [ 1254.797131][T25761] __shmem_file_setup+0x14c/0x1d0 [ 1254.802164][T25761] shmem_file_setup+0x37/0x40 [ 1254.806838][T25761] __se_sys_memfd_create+0x1eb/0x390 [ 1254.812121][T25761] __x64_sys_memfd_create+0x2d/0x40 [ 1254.818217][T25761] do_syscall_64+0x44/0xa0 [ 1254.822636][T25761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.828579][T25761] RIP: 0033:0x4665f9 [ 1254.832466][T25761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.852314][T25761] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 08:58:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:27 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:27 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1254.860917][T25761] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 00000000004665f9 [ 1254.868883][T25761] RDX: 0000000000011900 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1254.876847][T25761] RBP: 0000000000000003 R08: 0000000000008c80 R09: ffffffffffffffff [ 1254.884810][T25761] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1254.892777][T25761] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000040 [ 1254.944040][T25766] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1254.947668][T25775] FAULT_INJECTION: forcing a failure. [ 1254.947668][T25775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1254.955654][T25766] EXT4-fs (loop2): get root inode failed [ 1254.969065][T25775] CPU: 0 PID: 25775 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1254.974709][T25766] EXT4-fs (loop2): mount failed [ 1254.983531][T25775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.983544][T25775] Call Trace: [ 1254.983552][T25775] dump_stack_lvl+0xd6/0x122 [ 1255.006489][T25775] dump_stack+0x11/0x1b [ 1255.010695][T25775] should_fail+0x23c/0x250 [ 1255.015213][T25775] should_fail_usercopy+0x16/0x20 [ 1255.020332][T25775] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 1255.026057][T25775] ? shmem_write_begin+0x7e/0x100 [ 1255.031217][T25775] generic_perform_write+0x201/0x3e0 [ 1255.036587][T25775] __generic_file_write_iter+0x174/0x310 [ 1255.042373][T25775] generic_file_write_iter+0x75/0x130 [ 1255.047741][T25775] vfs_write+0x79c/0x8d0 [ 1255.052029][T25775] __x64_sys_pwrite64+0xf5/0x150 [ 1255.057010][T25775] do_syscall_64+0x44/0xa0 [ 1255.061415][T25775] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1255.067344][T25775] RIP: 0033:0x419797 [ 1255.071235][T25775] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1255.090852][T25775] RSP: 002b:00007f1e348c5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1255.099298][T25775] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1255.107363][T25775] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 1255.115341][T25775] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1255.123336][T25775] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1255.132255][T25775] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 1255.140655][T25775] loop0: detected capacity change from 0 to 264192 [ 1255.152852][T25775] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1255.169913][T25775] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1255.193495][T25775] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:29 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:29 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:29 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:29 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1256.848236][T25801] FAULT_INJECTION: forcing a failure. [ 1256.848236][T25801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1256.861957][T25801] CPU: 0 PID: 25801 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1256.870816][T25801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.877133][T25807] loop3: detected capacity change from 0 to 264192 [ 1256.880876][T25801] Call Trace: [ 1256.880886][T25801] dump_stack_lvl+0xd6/0x122 [ 1256.895530][T25801] dump_stack+0x11/0x1b [ 1256.899709][T25801] should_fail+0x23c/0x250 [ 1256.904216][T25801] should_fail_usercopy+0x16/0x20 [ 1256.906288][T25815] FAULT_INJECTION: forcing a failure. [ 1256.906288][T25815] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1256.909270][T25801] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 1256.928162][T25801] ? shmem_write_begin+0x7e/0x100 [ 1256.933271][T25801] generic_perform_write+0x201/0x3e0 [ 1256.938814][T25801] __generic_file_write_iter+0x174/0x310 [ 1256.944556][T25801] generic_file_write_iter+0x75/0x130 [ 1256.949927][T25801] vfs_write+0x79c/0x8d0 [ 1256.954251][T25801] __x64_sys_pwrite64+0xf5/0x150 [ 1256.959192][T25801] do_syscall_64+0x44/0xa0 [ 1256.963786][T25801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1256.969775][T25801] RIP: 0033:0x419797 [ 1256.973743][T25801] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1256.993471][T25801] RSP: 002b:00007f1e348c5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1257.001886][T25801] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1257.009851][T25801] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1257.017824][T25801] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1257.025861][T25801] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1257.034089][T25801] R13: 0000000000000004 R14: 0000000020000318 R15: 0000000000000001 [ 1257.042068][T25815] CPU: 1 PID: 25815 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1257.050736][T25801] loop0: detected capacity change from 0 to 264192 [ 1257.051188][T25815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1257.064580][T25804] loop2: detected capacity change from 0 to 264192 [ 1257.068004][T25815] Call Trace: [ 1257.068013][T25815] dump_stack_lvl+0xd6/0x122 [ 1257.068038][T25815] dump_stack+0x11/0x1b [ 1257.068056][T25815] should_fail+0x23c/0x250 [ 1257.091076][T25815] __alloc_pages+0x102/0x320 08:58:29 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1257.095682][T25815] alloc_pages_vma+0x5ee/0x770 [ 1257.100469][T25815] shmem_getpage_gfp+0x96d/0x13d0 [ 1257.105618][T25815] ? policydb_context_isvalid+0x135/0x230 [ 1257.111430][T25815] shmem_write_begin+0x7e/0x100 [ 1257.116294][T25815] generic_perform_write+0x1b8/0x3e0 [ 1257.121673][T25815] __generic_file_write_iter+0x174/0x310 [ 1257.127331][T25815] generic_file_write_iter+0x75/0x130 [ 1257.132831][T25815] vfs_write+0x79c/0x8d0 [ 1257.137090][T25815] __x64_sys_pwrite64+0xf5/0x150 [ 1257.142049][T25815] do_syscall_64+0x44/0xa0 [ 1257.146488][T25815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1257.152516][T25815] RIP: 0033:0x419797 [ 1257.156418][T25815] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1257.160438][T25804] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1257.176180][T25815] RSP: 002b:00007f28bfd50f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1257.176213][T25815] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1257.176225][T25815] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 1257.176237][T25815] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1257.187712][T25804] EXT4-fs (loop2): get root inode failed [ 1257.196244][T25815] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1257.204226][T25804] EXT4-fs (loop2): mount failed [ 1257.212356][T25815] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 1257.212509][T25807] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1257.260336][T25815] loop5: detected capacity change from 0 to 264192 [ 1257.261436][T25801] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1257.280932][T25801] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1257.293272][T25815] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 08:58:29 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000005, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:29 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1257.299622][T25807] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1257.325858][T25801] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1257.337476][T25807] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:29 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1257.398975][T25847] loop2: detected capacity change from 0 to 264192 [ 1257.408341][T25847] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1257.414161][T25854] FAULT_INJECTION: forcing a failure. [ 1257.414161][T25854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1257.419885][T25847] EXT4-fs (loop2): get root inode failed [ 1257.432999][T25854] CPU: 0 PID: 25854 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1257.438645][T25847] EXT4-fs (loop2): mount failed [ 1257.447451][T25854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1257.447465][T25854] Call Trace: [ 1257.447472][T25854] dump_stack_lvl+0xd6/0x122 [ 1257.470380][T25854] dump_stack+0x11/0x1b [ 1257.474543][T25854] should_fail+0x23c/0x250 [ 1257.478994][T25854] should_fail_usercopy+0x16/0x20 [ 1257.484121][T25854] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 1257.487402][T25858] loop3: detected capacity change from 0 to 264192 [ 1257.489970][T25854] ? shmem_write_begin+0x7e/0x100 [ 1257.501797][T25854] generic_perform_write+0x201/0x3e0 [ 1257.507135][T25854] __generic_file_write_iter+0x174/0x310 [ 1257.512973][T25854] generic_file_write_iter+0x75/0x130 [ 1257.518447][T25854] vfs_write+0x79c/0x8d0 [ 1257.522708][T25854] __x64_sys_pwrite64+0xf5/0x150 [ 1257.527691][T25854] do_syscall_64+0x44/0xa0 [ 1257.532131][T25854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1257.538044][T25854] RIP: 0033:0x419797 [ 1257.538810][T25858] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1257.542000][T25854] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1257.542020][T25854] RSP: 002b:00007f28bfd50f20 EFLAGS: 00000293 [ 1257.555323][T25858] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1257.574765][T25854] ORIG_RAX: 0000000000000012 [ 1257.574777][T25854] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1257.574790][T25854] RDX: 000000000000003a RSI: 0000000020000080 RDI: 0000000000000004 [ 1257.574802][T25854] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1257.574815][T25854] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1257.584625][T25858] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1257.590306][T25854] R13: 0000000000000004 R14: 0000000020000300 R15: 0000000000000000 [ 1257.606713][T25867] FAULT_INJECTION: forcing a failure. [ 1257.606713][T25867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1257.619643][T25854] loop5: detected capacity change from 0 to 264192 [ 1257.627262][T25867] CPU: 0 PID: 25867 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1257.674903][T25867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1257.683685][T25854] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1257.684960][T25867] Call Trace: [ 1257.684969][T25867] dump_stack_lvl+0xd6/0x122 [ 1257.701819][T25854] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1257.706005][T25867] dump_stack+0x11/0x1b [ 1257.706031][T25867] should_fail+0x23c/0x250 [ 1257.706051][T25867] __alloc_pages+0x102/0x320 [ 1257.717997][T25854] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1257.719416][T25867] alloc_pages_vma+0x5ee/0x770 [ 1257.744209][T25867] shmem_getpage_gfp+0x96d/0x13d0 [ 1257.749264][T25867] ? policydb_context_isvalid+0x135/0x230 [ 1257.755094][T25867] shmem_write_begin+0x7e/0x100 [ 1257.759957][T25867] generic_perform_write+0x1b8/0x3e0 [ 1257.765367][T25867] __generic_file_write_iter+0x174/0x310 [ 1257.771294][T25867] generic_file_write_iter+0x75/0x130 [ 1257.776731][T25867] vfs_write+0x79c/0x8d0 [ 1257.781039][T25867] __x64_sys_pwrite64+0xf5/0x150 [ 1257.786140][T25867] do_syscall_64+0x44/0xa0 [ 1257.790547][T25867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1257.796758][T25867] RIP: 0033:0x419797 [ 1257.800654][T25867] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1257.820393][T25867] RSP: 002b:00007f1e348c5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1257.828823][T25867] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1257.836789][T25867] RDX: 0000000000000024 RSI: 0000000020000140 RDI: 0000000000000004 [ 1257.844790][T25867] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1257.852759][T25867] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 1257.860727][T25867] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 1257.872654][T25867] loop0: detected capacity change from 0 to 264192 [ 1257.881695][T25867] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1257.887341][T25847] loop2: detected capacity change from 0 to 264192 [ 1257.893826][T25867] EXT4-fs (loop0): get root inode failed [ 1257.905968][T25867] EXT4-fs (loop0): mount failed 08:58:32 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:32 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:32 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000005, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000006, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:32 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1259.908070][T25899] FAULT_INJECTION: forcing a failure. [ 1259.908070][T25899] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.909583][T25901] loop2: detected capacity change from 0 to 264192 [ 1259.920683][T25899] CPU: 0 PID: 25899 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1259.927666][T25903] FAULT_INJECTION: forcing a failure. [ 1259.927666][T25903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1259.936052][T25899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1259.936067][T25899] Call Trace: [ 1259.936074][T25899] dump_stack_lvl+0xd6/0x122 [ 1259.936099][T25899] dump_stack+0x11/0x1b [ 1259.936118][T25899] should_fail+0x23c/0x250 [ 1259.976295][T25899] ? xas_create+0x3fb/0xb30 [ 1259.980797][T25899] __should_failslab+0x81/0x90 [ 1259.985556][T25899] should_failslab+0x5/0x20 [ 1259.990051][T25899] kmem_cache_alloc+0x4f/0x300 [ 1259.994878][T25899] ? try_to_wake_up+0x362/0x480 [ 1259.999721][T25899] xas_create+0x3fb/0xb30 [ 1260.004132][T25899] ? get_page_from_freelist+0x4d0/0x830 [ 1260.009858][T25899] xas_create_range+0x146/0x360 [ 1260.014707][T25899] shmem_add_to_page_cache+0x3bd/0x660 [ 1260.020189][T25899] shmem_getpage_gfp+0xba5/0x13d0 [ 1260.025294][T25899] ? __perf_event_task_sched_out+0xe6b/0xec0 [ 1260.031290][T25899] shmem_write_begin+0x7e/0x100 [ 1260.036135][T25899] generic_perform_write+0x1b8/0x3e0 [ 1260.041701][T25899] __generic_file_write_iter+0x174/0x310 [ 1260.047330][T25899] generic_file_write_iter+0x75/0x130 [ 1260.052706][T25899] vfs_write+0x79c/0x8d0 [ 1260.057132][T25899] __x64_sys_pwrite64+0xf5/0x150 [ 1260.062178][T25899] do_syscall_64+0x44/0xa0 [ 1260.066928][T25899] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1260.072908][T25899] RIP: 0033:0x419797 [ 1260.076878][T25899] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1260.096487][T25899] RSP: 002b:00007f1e348c5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1260.104907][T25899] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1260.113045][T25899] RDX: 0000000000000024 RSI: 0000000020000140 RDI: 0000000000000004 [ 1260.121131][T25899] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1260.129178][T25899] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 1260.137137][T25899] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 1260.145226][T25903] CPU: 1 PID: 25903 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1260.154077][T25903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.159899][T25899] loop0: detected capacity change from 0 to 264192 [ 1260.164131][T25903] Call Trace: [ 1260.164140][T25903] dump_stack_lvl+0xd6/0x122 [ 1260.178750][T25903] dump_stack+0x11/0x1b [ 1260.183264][T25903] should_fail+0x23c/0x250 [ 1260.187691][T25903] should_fail_usercopy+0x16/0x20 [ 1260.192790][T25903] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 1260.198511][T25903] ? shmem_write_begin+0x7e/0x100 [ 1260.203674][T25903] generic_perform_write+0x201/0x3e0 [ 1260.209099][T25903] __generic_file_write_iter+0x174/0x310 [ 1260.214772][T25903] generic_file_write_iter+0x75/0x130 [ 1260.220204][T25903] vfs_write+0x79c/0x8d0 [ 1260.224446][T25903] __x64_sys_pwrite64+0xf5/0x150 [ 1260.229446][T25903] do_syscall_64+0x44/0xa0 [ 1260.233937][T25903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1260.239831][T25903] RIP: 0033:0x419797 [ 1260.243750][T25903] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1260.263784][T25903] RSP: 002b:00007f28bfd50f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1260.272191][T25903] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1260.280200][T25903] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1260.288513][T25903] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1260.296501][T25903] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 08:58:32 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1260.304549][T25903] R13: 0000000000000004 R14: 0000000020000318 R15: 0000000000000001 [ 1260.316685][T25901] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1260.328316][T25901] EXT4-fs (loop2): get root inode failed [ 1260.334056][T25901] EXT4-fs (loop2): mount failed [ 1260.334727][T25906] loop3: detected capacity change from 0 to 264192 [ 1260.346143][T25899] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature 08:58:32 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000007, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:32 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:32 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:32 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1260.419945][T25899] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1260.422478][T25906] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1260.443992][T25906] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1260.448826][T25899] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:32 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:32 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1260.475903][T25903] loop5: detected capacity change from 0 to 264192 [ 1260.499261][T25940] loop2: detected capacity change from 0 to 264192 [ 1260.518041][T25906] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1260.543759][T25903] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1260.560998][T25940] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1260.572583][T25940] EXT4-fs (loop2): get root inode failed [ 1260.577962][T25903] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1260.578315][T25940] EXT4-fs (loop2): mount failed [ 1260.610967][T25903] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1260.619049][T25959] FAULT_INJECTION: forcing a failure. [ 1260.619049][T25959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1260.634570][T25959] CPU: 1 PID: 25959 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1260.643455][T25959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.653687][T25959] Call Trace: [ 1260.656970][T25959] dump_stack_lvl+0xd6/0x122 [ 1260.661569][T25959] dump_stack+0x11/0x1b [ 1260.665791][T25959] should_fail+0x23c/0x250 [ 1260.670240][T25959] should_fail_usercopy+0x16/0x20 08:58:33 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000006, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000008, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1260.675290][T25959] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 1260.681013][T25959] ? shmem_write_begin+0x7e/0x100 [ 1260.686311][T25959] generic_perform_write+0x201/0x3e0 [ 1260.691753][T25959] __generic_file_write_iter+0x174/0x310 [ 1260.697401][T25959] generic_file_write_iter+0x75/0x130 [ 1260.702784][T25959] vfs_write+0x79c/0x8d0 [ 1260.707097][T25959] __x64_sys_pwrite64+0xf5/0x150 [ 1260.712311][T25959] do_syscall_64+0x44/0xa0 [ 1260.717267][T25959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1260.723169][T25959] RIP: 0033:0x419797 08:58:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 08:58:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1260.727060][T25959] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1260.746676][T25959] RSP: 002b:00007f1e348c5f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1260.755177][T25959] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1260.763147][T25959] RDX: 0000000000000024 RSI: 0000000020000140 RDI: 0000000000000004 08:58:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1260.771205][T25959] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1260.779183][T25959] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 1260.787261][T25959] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 1260.804957][T25959] loop0: detected capacity change from 0 to 264192 [ 1260.821148][T25959] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1260.835649][T25959] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1260.865906][T26000] loop3: detected capacity change from 0 to 264192 [ 1260.875616][T25999] loop2: detected capacity change from 0 to 264192 [ 1260.878860][T25959] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1260.882498][T26006] FAULT_INJECTION: forcing a failure. [ 1260.882498][T26006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1260.894983][T26000] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1260.906959][T26006] CPU: 1 PID: 26006 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1260.928988][T26006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.939192][T26006] Call Trace: [ 1260.942524][T26006] dump_stack_lvl+0xd6/0x122 [ 1260.947127][T26006] dump_stack+0x11/0x1b [ 1260.951293][T26006] should_fail+0x23c/0x250 [ 1260.955809][T26006] __alloc_pages+0x102/0x320 [ 1260.960447][T26006] alloc_pages_vma+0x5ee/0x770 [ 1260.965237][T26006] shmem_getpage_gfp+0x96d/0x13d0 [ 1260.970348][T26006] ? policydb_context_isvalid+0x135/0x230 [ 1260.976075][T26006] shmem_write_begin+0x7e/0x100 [ 1260.980947][T26006] generic_perform_write+0x1b8/0x3e0 [ 1260.986285][T26006] __generic_file_write_iter+0x174/0x310 [ 1260.991981][T26006] generic_file_write_iter+0x75/0x130 [ 1260.997384][T26006] vfs_write+0x79c/0x8d0 [ 1261.001644][T26006] __x64_sys_pwrite64+0xf5/0x150 [ 1261.006618][T26006] do_syscall_64+0x44/0xa0 [ 1261.011130][T26006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1261.017030][T26006] RIP: 0033:0x419797 [ 1261.021038][T26006] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1261.040752][T26006] RSP: 002b:00007f28bfd50f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1261.049162][T26006] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1261.057186][T26006] RDX: 0000000000000024 RSI: 0000000020000140 RDI: 0000000000000004 [ 1261.065148][T26006] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff 08:58:33 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1261.073155][T26006] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 1261.081119][T26006] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 1261.092875][T26000] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1261.125504][T26000] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1261.163852][T26006] loop5: detected capacity change from 0 to 264192 [ 1261.168343][T26015] FAULT_INJECTION: forcing a failure. [ 1261.168343][T26015] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.183310][T26015] CPU: 1 PID: 26015 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1261.192139][T26015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1261.202716][T26015] Call Trace: [ 1261.206028][T26015] dump_stack_lvl+0xd6/0x122 [ 1261.211087][T26015] dump_stack+0x11/0x1b [ 1261.215236][T26015] should_fail+0x23c/0x250 [ 1261.219660][T26015] ? getname_flags+0x84/0x3f0 [ 1261.224394][T26015] __should_failslab+0x81/0x90 [ 1261.229154][T26015] should_failslab+0x5/0x20 [ 1261.233650][T26015] kmem_cache_alloc+0x4f/0x300 [ 1261.238413][T26015] getname_flags+0x84/0x3f0 [ 1261.242918][T26015] getname+0x15/0x20 [ 1261.246834][T26015] do_sys_openat2+0x6d/0x2b0 [ 1261.251519][T26015] __x64_sys_openat+0xef/0x110 [ 1261.256281][T26015] do_syscall_64+0x44/0xa0 [ 1261.260808][T26015] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1261.266706][T26015] RIP: 0033:0x4196e4 [ 1261.270604][T26015] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1261.290205][T26015] RSP: 002b:00007f1e348c5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1261.298683][T26015] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1261.306668][T26015] RDX: 0000000000000002 RSI: 00007f1e348c6000 RDI: 00000000ffffff9c [ 1261.314733][T26015] RBP: 00007f1e348c6000 R08: 0000000000000000 R09: ffffffffffffffff [ 1261.322805][T26015] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1261.330787][T26015] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1261.348444][T26006] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1261.360493][T26006] EXT4-fs (loop5): get root inode failed [ 1261.366177][T26006] EXT4-fs (loop5): mount failed 08:58:33 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:33 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000007, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1261.372915][T25999] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1261.384479][T25999] EXT4-fs (loop2): get root inode failed [ 1261.390229][T25999] EXT4-fs (loop2): mount failed 08:58:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000009, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:33 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1261.482330][T26039] loop3: detected capacity change from 0 to 264192 [ 1261.489308][T26043] FAULT_INJECTION: forcing a failure. [ 1261.489308][T26043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1261.495142][T26048] FAULT_INJECTION: forcing a failure. [ 1261.495142][T26048] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.502473][T26043] CPU: 0 PID: 26043 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1261.524384][T26043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1261.534637][T26043] Call Trace: [ 1261.537911][T26043] dump_stack_lvl+0xd6/0x122 [ 1261.542508][T26043] dump_stack+0x11/0x1b [ 1261.546660][T26043] should_fail+0x23c/0x250 [ 1261.551103][T26043] should_fail_usercopy+0x16/0x20 [ 1261.559251][T26043] strncpy_from_user+0x21/0x250 [ 1261.564160][T26043] getname_flags+0xb8/0x3f0 [ 1261.568662][T26043] getname+0x15/0x20 [ 1261.572561][T26043] do_sys_openat2+0x6d/0x2b0 [ 1261.577321][T26043] __x64_sys_openat+0xef/0x110 [ 1261.582278][T26043] do_syscall_64+0x44/0xa0 [ 1261.586700][T26043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1261.592842][T26043] RIP: 0033:0x4196e4 [ 1261.597531][T26043] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1261.618087][T26043] RSP: 002b:00007f1e348c5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1261.626521][T26043] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1261.634610][T26043] RDX: 0000000000000002 RSI: 00007f1e348c6000 RDI: 00000000ffffff9c [ 1261.642717][T26043] RBP: 00007f1e348c6000 R08: 0000000000000000 R09: ffffffffffffffff [ 1261.650699][T26043] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1261.658703][T26043] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1261.666765][T26048] CPU: 1 PID: 26048 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1261.675797][T26048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1261.685860][T26048] Call Trace: [ 1261.689252][T26048] dump_stack_lvl+0xd6/0x122 [ 1261.693894][T26048] dump_stack+0x11/0x1b [ 1261.698065][T26048] should_fail+0x23c/0x250 [ 1261.702490][T26048] ? xas_create+0x3fb/0xb30 [ 1261.707358][T26048] __should_failslab+0x81/0x90 [ 1261.712477][T26048] should_failslab+0x5/0x20 [ 1261.717349][T26048] kmem_cache_alloc+0x4f/0x300 [ 1261.722255][T26048] xas_create+0x3fb/0xb30 [ 1261.726608][T26048] ? get_page_from_freelist+0x4d0/0x830 [ 1261.732191][T26048] xas_create_range+0x146/0x360 [ 1261.737053][T26048] shmem_add_to_page_cache+0x3bd/0x660 [ 1261.742528][T26048] shmem_getpage_gfp+0xba5/0x13d0 [ 1261.747682][T26048] ? policydb_context_isvalid+0x135/0x230 [ 1261.752515][T26049] loop2: detected capacity change from 0 to 264192 [ 1261.753633][T26048] shmem_write_begin+0x7e/0x100 [ 1261.765169][T26048] generic_perform_write+0x1b8/0x3e0 [ 1261.770528][T26048] __generic_file_write_iter+0x174/0x310 [ 1261.776181][T26048] generic_file_write_iter+0x75/0x130 [ 1261.777487][T26039] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1261.781838][T26048] vfs_write+0x79c/0x8d0 [ 1261.799224][T26048] __x64_sys_pwrite64+0xf5/0x150 [ 1261.804323][T26048] do_syscall_64+0x44/0xa0 [ 1261.808757][T26048] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1261.814840][T26048] RIP: 0033:0x419797 [ 1261.817845][T26039] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1261.818736][T26048] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1261.837882][T26039] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1261.847792][T26048] RSP: 002b:00007f28bfd50f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1261.847816][T26048] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 08:58:34 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:34 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:34 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x114}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1261.870291][T26049] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1261.875719][T26048] RDX: 0000000000000024 RSI: 0000000020000140 RDI: 0000000000000004 [ 1261.875737][T26048] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1261.875749][T26048] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 1261.875762][T26048] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 1261.887259][T26049] EXT4-fs (loop2): get root inode failed [ 1261.924955][T26049] EXT4-fs (loop2): mount failed [ 1261.939208][T26048] loop5: detected capacity change from 0 to 264192 [ 1261.939410][T26066] FAULT_INJECTION: forcing a failure. [ 1261.939410][T26066] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.958833][T26066] CPU: 0 PID: 26066 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1261.967681][T26066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1261.977733][T26066] Call Trace: [ 1261.981009][T26066] dump_stack_lvl+0xd6/0x122 [ 1261.985618][T26066] dump_stack+0x11/0x1b [ 1261.989817][T26066] should_fail+0x23c/0x250 [ 1261.994434][T26066] ? __alloc_file+0x2e/0x1a0 [ 1261.999035][T26066] __should_failslab+0x81/0x90 [ 1262.003798][T26066] should_failslab+0x5/0x20 [ 1262.008487][T26066] kmem_cache_alloc+0x4f/0x300 [ 1262.013357][T26066] __alloc_file+0x2e/0x1a0 [ 1262.017823][T26066] alloc_empty_file+0xcd/0x1c0 [ 1262.022596][T26066] path_openat+0x6a/0x1ec0 [ 1262.027071][T26066] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 1262.033115][T26066] ? set_page_dirty+0xf4/0x1a0 08:58:34 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12f}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1262.038077][T26066] ? shmem_write_end+0x37d/0x3d0 [ 1262.043027][T26066] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 1262.049288][T26066] ? generic_perform_write+0x377/0x3e0 [ 1262.054851][T26066] do_filp_open+0x105/0x220 [ 1262.059364][T26066] do_sys_openat2+0xb5/0x2b0 [ 1262.063989][T26066] __x64_sys_openat+0xef/0x110 [ 1262.068781][T26066] do_syscall_64+0x44/0xa0 [ 1262.073207][T26066] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1262.079175][T26066] RIP: 0033:0x4196e4 [ 1262.083123][T26066] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1262.093307][T26048] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1262.102999][T26066] RSP: 002b:00007f1e348c5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1262.103022][T26066] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1262.103035][T26066] RDX: 0000000000000002 RSI: 00007f1e348c6000 RDI: 00000000ffffff9c 08:58:34 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000008, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:34 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:34 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15f}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1262.103047][T26066] RBP: 00007f1e348c6000 R08: 0000000000000000 R09: ffffffffffffffff [ 1262.124672][T26048] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1262.132291][T26066] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1262.132306][T26066] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1262.174426][T26048] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000a, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:34 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1262.249826][T26102] loop2: detected capacity change from 0 to 264192 [ 1262.260505][T26112] FAULT_INJECTION: forcing a failure. [ 1262.260505][T26112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1262.273568][T26112] CPU: 0 PID: 26112 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1262.275066][T26113] FAULT_INJECTION: forcing a failure. [ 1262.275066][T26113] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.282328][T26112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1262.282341][T26112] Call Trace: [ 1262.282349][T26112] dump_stack_lvl+0xd6/0x122 [ 1262.313065][T26112] dump_stack+0x11/0x1b [ 1262.317286][T26112] should_fail+0x23c/0x250 [ 1262.321769][T26112] should_fail_usercopy+0x16/0x20 [ 1262.326790][T26112] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 1262.332581][T26112] ? shmem_write_begin+0x7e/0x100 [ 1262.337610][T26112] generic_perform_write+0x201/0x3e0 [ 1262.342893][T26112] __generic_file_write_iter+0x174/0x310 [ 1262.348617][T26112] generic_file_write_iter+0x75/0x130 [ 1262.353987][T26112] vfs_write+0x79c/0x8d0 [ 1262.358219][T26112] __x64_sys_pwrite64+0xf5/0x150 [ 1262.363370][T26112] do_syscall_64+0x44/0xa0 [ 1262.368042][T26112] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1262.374114][T26112] RIP: 0033:0x419797 [ 1262.377995][T26112] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1262.397693][T26112] RSP: 002b:00007f28bfd50f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1262.406093][T26112] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1262.414047][T26112] RDX: 0000000000000024 RSI: 0000000020000140 RDI: 0000000000000004 [ 1262.422018][T26112] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1262.429976][T26112] R10: 0000000000008c80 R11: 0000000000000293 R12: 0000000000000004 [ 1262.437947][T26112] R13: 0000000000000004 R14: 0000000020000330 R15: 0000000000000002 [ 1262.445965][T26113] CPU: 1 PID: 26113 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1262.454755][T26113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1262.460036][T26112] loop5: detected capacity change from 0 to 264192 [ 1262.464816][T26113] Call Trace: [ 1262.464824][T26113] dump_stack_lvl+0xd6/0x122 [ 1262.479181][T26113] dump_stack+0x11/0x1b [ 1262.483344][T26113] should_fail+0x23c/0x250 [ 1262.487923][T26113] ? security_file_alloc+0x30/0x190 [ 1262.493216][T26113] __should_failslab+0x81/0x90 08:58:34 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1262.498087][T26113] should_failslab+0x5/0x20 [ 1262.502604][T26113] kmem_cache_alloc+0x4f/0x300 [ 1262.507376][T26113] security_file_alloc+0x30/0x190 [ 1262.512426][T26113] __alloc_file+0x83/0x1a0 [ 1262.517335][T26113] alloc_empty_file+0xcd/0x1c0 [ 1262.519410][T26124] loop3: detected capacity change from 0 to 264192 [ 1262.522110][T26113] path_openat+0x6a/0x1ec0 [ 1262.522140][T26113] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 1262.522160][T26113] ? set_page_dirty+0xf4/0x1a0 [ 1262.543706][T26113] ? shmem_write_end+0x37d/0x3d0 [ 1262.548654][T26113] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 1262.554921][T26113] ? generic_perform_write+0x377/0x3e0 [ 1262.560487][T26113] do_filp_open+0x105/0x220 [ 1262.565100][T26113] do_sys_openat2+0xb5/0x2b0 [ 1262.569712][T26113] __x64_sys_openat+0xef/0x110 [ 1262.574520][T26113] do_syscall_64+0x44/0xa0 [ 1262.578980][T26113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1262.584924][T26113] RIP: 0033:0x4196e4 [ 1262.588842][T26113] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1262.609410][T26113] RSP: 002b:00007f1e348c5ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1262.617819][T26113] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1262.625778][T26113] RDX: 0000000000000002 RSI: 00007f1e348c6000 RDI: 00000000ffffff9c [ 1262.633744][T26113] RBP: 00007f1e348c6000 R08: 0000000000000000 R09: ffffffffffffffff [ 1262.642062][T26113] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1262.650201][T26113] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1262.675514][T26102] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1262.686206][T26112] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature 08:58:35 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:35 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1262.687170][T26102] EXT4-fs (loop2): get root inode failed [ 1262.700668][T26112] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1262.706011][T26102] EXT4-fs (loop2): mount failed [ 1262.744059][T26112] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1262.760388][T26139] FAULT_INJECTION: forcing a failure. [ 1262.760388][T26139] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.773048][T26139] CPU: 0 PID: 26139 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1262.781815][T26139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1262.791882][T26139] Call Trace: [ 1262.795158][T26139] dump_stack_lvl+0xd6/0x122 [ 1262.795473][T26124] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1262.799766][T26139] dump_stack+0x11/0x1b [ 1262.799788][T26139] should_fail+0x23c/0x250 [ 1262.821162][T26139] ? kzalloc+0x16/0x20 [ 1262.825384][T26139] __should_failslab+0x81/0x90 [ 1262.830221][T26139] should_failslab+0x5/0x20 [ 1262.834809][T26139] __kmalloc+0x6f/0x350 [ 1262.839058][T26139] ? _atomic_dec_and_lock+0x60/0xd0 [ 1262.840648][T26124] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1262.844272][T26139] kzalloc+0x16/0x20 [ 1262.857539][T26139] alloc_workqueue+0x12f/0xad0 [ 1262.862391][T26139] ? disk_unblock_events+0x35/0x40 [ 1262.867530][T26139] ? bd_prepare_to_claim+0x1e6/0x270 [ 1262.870428][T26124] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1262.872826][T26139] ? loop_attr_do_show_dio+0x70/0x70 [ 1262.888764][T26139] ? loop_set_status_from_info+0x35e/0x3a0 08:58:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21d}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:35 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000009, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1262.894667][T26139] loop_configure+0x681/0xeb0 [ 1262.899456][T26139] lo_ioctl+0x618/0x13e0 [ 1262.903740][T26139] ? path_openat+0x18d4/0x1ec0 [ 1262.908526][T26139] ? blkdev_common_ioctl+0x438/0x1110 [ 1262.913902][T26139] ? selinux_file_ioctl+0x981/0xa10 [ 1262.919195][T26139] ? lo_release+0x120/0x120 [ 1262.924655][T26139] blkdev_ioctl+0x1d0/0x3f0 [ 1262.929218][T26139] block_ioctl+0x6e/0x80 [ 1262.933468][T26139] ? blkdev_iopoll+0x80/0x80 [ 1262.938090][T26139] __se_sys_ioctl+0xcb/0x140 08:58:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d5}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1262.942686][T26139] __x64_sys_ioctl+0x3f/0x50 [ 1262.947320][T26139] do_syscall_64+0x44/0xa0 [ 1262.951827][T26139] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1262.957884][T26139] RIP: 0033:0x4663b7 [ 1262.961794][T26139] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.981534][T26139] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:58:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ea}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1262.989945][T26139] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1262.998093][T26139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1263.006068][T26139] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1263.014046][T26139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1263.022480][T26139] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:58:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:35 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1263.074491][T26172] loop2: detected capacity change from 0 to 264192 [ 1263.110228][T26172] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1263.114258][T26192] FAULT_INJECTION: forcing a failure. [ 1263.114258][T26192] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.121934][T26172] EXT4-fs (loop2): get root inode failed [ 1263.134460][T26192] CPU: 1 PID: 26192 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1263.140092][T26172] EXT4-fs (loop2): mount failed [ 1263.148807][T26192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.148820][T26192] Call Trace: [ 1263.167069][T26192] dump_stack_lvl+0xd6/0x122 [ 1263.170235][T26193] FAULT_INJECTION: forcing a failure. [ 1263.170235][T26193] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.171713][T26192] dump_stack+0x11/0x1b [ 1263.188427][T26192] should_fail+0x23c/0x250 [ 1263.192859][T26192] ? getname_flags+0x84/0x3f0 [ 1263.197548][T26192] __should_failslab+0x81/0x90 [ 1263.202341][T26192] should_failslab+0x5/0x20 [ 1263.206857][T26192] kmem_cache_alloc+0x4f/0x300 [ 1263.211883][T26192] getname_flags+0x84/0x3f0 [ 1263.216379][T26192] getname+0x15/0x20 [ 1263.220421][T26192] do_sys_openat2+0x6d/0x2b0 [ 1263.225063][T26192] __x64_sys_openat+0xef/0x110 [ 1263.229819][T26192] do_syscall_64+0x44/0xa0 [ 1263.234504][T26192] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1263.240447][T26192] RIP: 0033:0x4196e4 [ 1263.244365][T26192] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1263.263962][T26192] RSP: 002b:00007f28bfd50ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1263.272361][T26192] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1263.280322][T26192] RDX: 0000000000000002 RSI: 00007f28bfd51000 RDI: 00000000ffffff9c [ 1263.288365][T26192] RBP: 00007f28bfd51000 R08: 0000000000000000 R09: ffffffffffffffff [ 1263.296424][T26192] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1263.304415][T26192] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1263.312391][T26193] CPU: 0 PID: 26193 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1263.321174][T26193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.322142][T26196] loop3: detected capacity change from 0 to 264192 [ 1263.331231][T26193] Call Trace: [ 1263.331241][T26193] dump_stack_lvl+0xd6/0x122 [ 1263.331267][T26193] dump_stack+0x11/0x1b [ 1263.331286][T26193] should_fail+0x23c/0x250 [ 1263.354264][T26193] __should_failslab+0x81/0x90 [ 1263.359063][T26193] ? alloc_workqueue+0x15d/0xad0 [ 1263.364099][T26193] should_failslab+0x5/0x20 [ 1263.368611][T26193] kmem_cache_alloc_trace+0x52/0x320 08:58:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x348}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1263.373896][T26193] alloc_workqueue+0x15d/0xad0 [ 1263.378725][T26193] ? disk_unblock_events+0x35/0x40 [ 1263.383839][T26193] ? bd_prepare_to_claim+0x1e6/0x270 [ 1263.389141][T26193] ? loop_attr_do_show_dio+0x70/0x70 [ 1263.394445][T26193] ? loop_set_status_from_info+0x35e/0x3a0 [ 1263.400305][T26193] loop_configure+0x681/0xeb0 [ 1263.405031][T26193] lo_ioctl+0x618/0x13e0 [ 1263.409291][T26193] ? path_openat+0x18d4/0x1ec0 [ 1263.414077][T26193] ? blkdev_common_ioctl+0x438/0x1110 [ 1263.419481][T26193] ? selinux_file_ioctl+0x981/0xa10 [ 1263.424732][T26193] ? lo_release+0x120/0x120 [ 1263.429243][T26193] blkdev_ioctl+0x1d0/0x3f0 [ 1263.433742][T26193] block_ioctl+0x6e/0x80 [ 1263.437986][T26193] ? blkdev_iopoll+0x80/0x80 [ 1263.442594][T26193] __se_sys_ioctl+0xcb/0x140 [ 1263.447207][T26193] __x64_sys_ioctl+0x3f/0x50 [ 1263.451802][T26193] do_syscall_64+0x44/0xa0 [ 1263.456220][T26193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1263.462148][T26193] RIP: 0033:0x4663b7 [ 1263.466085][T26193] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.470759][T26196] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1263.485689][T26193] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1263.485716][T26193] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1263.485728][T26193] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:58:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000c, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:36 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000a, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:36 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38d}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:36 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1263.485741][T26193] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1263.510550][T26196] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1263.515078][T26193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1263.515094][T26193] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1263.557324][T26196] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1263.619255][T26224] FAULT_INJECTION: forcing a failure. [ 1263.619255][T26224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1263.622979][T26226] FAULT_INJECTION: forcing a failure. [ 1263.622979][T26226] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.632511][T26224] CPU: 1 PID: 26224 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1263.632537][T26224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.632547][T26224] Call Trace: [ 1263.668192][T26224] dump_stack_lvl+0xd6/0x122 [ 1263.672789][T26224] dump_stack+0x11/0x1b [ 1263.676950][T26224] should_fail+0x23c/0x250 [ 1263.681388][T26224] should_fail_usercopy+0x16/0x20 [ 1263.686400][T26224] strncpy_from_user+0x21/0x250 [ 1263.691245][T26224] getname_flags+0xb8/0x3f0 [ 1263.695745][T26224] getname+0x15/0x20 [ 1263.699630][T26224] do_sys_openat2+0x6d/0x2b0 [ 1263.704208][T26224] __x64_sys_openat+0xef/0x110 [ 1263.708961][T26224] do_syscall_64+0x44/0xa0 [ 1263.713384][T26224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1263.719462][T26224] RIP: 0033:0x4196e4 [ 1263.723427][T26224] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1263.743107][T26224] RSP: 002b:00007f28bfd50ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1263.751540][T26224] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1263.759872][T26224] RDX: 0000000000000002 RSI: 00007f28bfd51000 RDI: 00000000ffffff9c [ 1263.767833][T26224] RBP: 00007f28bfd51000 R08: 0000000000000000 R09: ffffffffffffffff [ 1263.775792][T26224] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1263.783748][T26224] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1263.791759][T26226] CPU: 0 PID: 26226 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1263.800529][T26226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.810677][T26226] Call Trace: [ 1263.814039][T26226] dump_stack_lvl+0xd6/0x122 08:58:36 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:36 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1263.818659][T26226] dump_stack+0x11/0x1b [ 1263.822820][T26226] should_fail+0x23c/0x250 [ 1263.827235][T26226] ? kzalloc+0x16/0x20 [ 1263.831316][T26226] __should_failslab+0x81/0x90 [ 1263.836096][T26226] should_failslab+0x5/0x20 [ 1263.840611][T26226] __kmalloc+0x6f/0x350 [ 1263.844875][T26226] ? number+0xa13/0xb60 [ 1263.849124][T26226] kzalloc+0x16/0x20 [ 1263.853050][T26226] apply_wqattrs_prepare+0x3a/0x630 [ 1263.858364][T26226] ? vsnprintf+0xe8f/0xed0 [ 1263.862792][T26226] apply_workqueue_attrs+0x9e/0x100 08:58:36 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1263.868546][T26226] alloc_workqueue+0x777/0xad0 [ 1263.873422][T26226] ? disk_unblock_events+0x35/0x40 [ 1263.878621][T26226] ? bd_prepare_to_claim+0x1e6/0x270 [ 1263.883996][T26226] ? loop_attr_do_show_dio+0x70/0x70 [ 1263.889351][T26226] ? loop_set_status_from_info+0x35e/0x3a0 [ 1263.894260][T26235] FAULT_INJECTION: forcing a failure. [ 1263.894260][T26235] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.895226][T26226] loop_configure+0x681/0xeb0 [ 1263.912558][T26226] lo_ioctl+0x618/0x13e0 [ 1263.916837][T26226] ? path_openat+0x18d4/0x1ec0 [ 1263.921636][T26226] ? blkdev_common_ioctl+0x438/0x1110 [ 1263.927095][T26226] ? selinux_file_ioctl+0x981/0xa10 [ 1263.932311][T26226] ? lo_release+0x120/0x120 [ 1263.937240][T26226] blkdev_ioctl+0x1d0/0x3f0 [ 1263.942066][T26226] block_ioctl+0x6e/0x80 [ 1263.946299][T26226] ? blkdev_iopoll+0x80/0x80 [ 1263.950873][T26226] __se_sys_ioctl+0xcb/0x140 [ 1263.955523][T26226] __x64_sys_ioctl+0x3f/0x50 [ 1263.960103][T26226] do_syscall_64+0x44/0xa0 [ 1263.964512][T26226] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1263.970434][T26226] RIP: 0033:0x4663b7 [ 1263.974486][T26226] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.994110][T26226] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1264.002595][T26226] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1264.010553][T26226] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1264.018687][T26226] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1264.026666][T26226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1264.034805][T26226] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1264.042774][T26235] CPU: 1 PID: 26235 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1264.051627][T26235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.061680][T26235] Call Trace: [ 1264.064959][T26235] dump_stack_lvl+0xd6/0x122 [ 1264.069554][T26235] dump_stack+0x11/0x1b [ 1264.073719][T26235] should_fail+0x23c/0x250 [ 1264.078146][T26235] ? __alloc_file+0x2e/0x1a0 [ 1264.082831][T26235] __should_failslab+0x81/0x90 [ 1264.083481][T26225] loop2: detected capacity change from 0 to 264192 [ 1264.087618][T26235] should_failslab+0x5/0x20 [ 1264.087642][T26235] kmem_cache_alloc+0x4f/0x300 [ 1264.087662][T26235] __alloc_file+0x2e/0x1a0 [ 1264.107780][T26235] alloc_empty_file+0xcd/0x1c0 [ 1264.112602][T26235] path_openat+0x6a/0x1ec0 [ 1264.117072][T26235] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 1264.122979][T26235] ? set_page_dirty+0xf4/0x1a0 [ 1264.127740][T26235] ? shmem_write_end+0x37d/0x3d0 [ 1264.132716][T26235] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 1264.138967][T26235] ? generic_perform_write+0x377/0x3e0 [ 1264.144534][T26235] do_filp_open+0x105/0x220 [ 1264.149065][T26235] do_sys_openat2+0xb5/0x2b0 [ 1264.153667][T26235] __x64_sys_openat+0xef/0x110 [ 1264.158441][T26235] do_syscall_64+0x44/0xa0 [ 1264.162897][T26235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1264.168900][T26235] RIP: 0033:0x4196e4 [ 1264.172876][T26235] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1264.184954][T26225] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1264.192489][T26235] RSP: 002b:00007f28bfd50ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1264.204111][T26225] EXT4-fs (loop2): get root inode failed [ 1264.212451][T26235] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1264.212465][T26235] RDX: 0000000000000002 RSI: 00007f28bfd51000 RDI: 00000000ffffff9c [ 1264.212479][T26235] RBP: 00007f28bfd51000 R08: 0000000000000000 R09: ffffffffffffffff [ 1264.218096][T26225] EXT4-fs (loop2): mount failed [ 1264.226030][T26235] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1264.226045][T26235] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1264.259575][T26254] loop3: detected capacity change from 0 to 264192 [ 1264.272391][T26254] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1264.300782][T26254] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1264.320183][T26254] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:38 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:38 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:38 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000d, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:38 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1266.094874][T26277] loop2: detected capacity change from 0 to 264192 [ 1266.107055][T26286] FAULT_INJECTION: forcing a failure. [ 1266.107055][T26286] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.119689][T26286] CPU: 1 PID: 26286 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1266.128654][T26286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.131552][T26285] loop3: detected capacity change from 0 to 264192 [ 1266.138983][T26286] Call Trace: [ 1266.138995][T26286] dump_stack_lvl+0xd6/0x122 [ 1266.139021][T26286] dump_stack+0x11/0x1b [ 1266.139040][T26286] should_fail+0x23c/0x250 [ 1266.161928][T26286] ? security_file_alloc+0x30/0x190 [ 1266.167356][T26286] __should_failslab+0x81/0x90 [ 1266.172121][T26286] should_failslab+0x5/0x20 [ 1266.176634][T26286] kmem_cache_alloc+0x4f/0x300 [ 1266.181436][T26286] security_file_alloc+0x30/0x190 [ 1266.186452][T26286] __alloc_file+0x83/0x1a0 [ 1266.190910][T26286] alloc_empty_file+0xcd/0x1c0 [ 1266.195675][T26286] path_openat+0x6a/0x1ec0 [ 1266.200086][T26286] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 1266.205984][T26286] ? set_page_dirty+0xf4/0x1a0 [ 1266.210999][T26286] ? shmem_write_end+0x37d/0x3d0 [ 1266.215925][T26286] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 1266.222164][T26286] ? generic_perform_write+0x377/0x3e0 [ 1266.227704][T26286] do_filp_open+0x105/0x220 [ 1266.232201][T26286] do_sys_openat2+0xb5/0x2b0 [ 1266.236780][T26286] __x64_sys_openat+0xef/0x110 [ 1266.241541][T26286] do_syscall_64+0x44/0xa0 [ 1266.245949][T26286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1266.251846][T26286] RIP: 0033:0x4196e4 [ 1266.255737][T26286] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1266.275415][T26286] RSP: 002b:00007f28bfd50ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1266.283908][T26286] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1266.291934][T26286] RDX: 0000000000000002 RSI: 00007f28bfd51000 RDI: 00000000ffffff9c [ 1266.299913][T26286] RBP: 00007f28bfd51000 R08: 0000000000000000 R09: ffffffffffffffff [ 1266.308318][T26286] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1266.316274][T26286] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1266.326514][T26288] FAULT_INJECTION: forcing a failure. [ 1266.326514][T26288] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.339199][T26288] CPU: 0 PID: 26288 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1266.347957][T26288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.358015][T26288] Call Trace: [ 1266.361289][T26288] dump_stack_lvl+0xd6/0x122 [ 1266.365889][T26288] dump_stack+0x11/0x1b [ 1266.370047][T26288] should_fail+0x23c/0x250 [ 1266.374451][T26288] __should_failslab+0x81/0x90 [ 1266.379358][T26288] ? apply_wqattrs_prepare+0x5f/0x630 [ 1266.384715][T26288] should_failslab+0x5/0x20 [ 1266.389271][T26288] kmem_cache_alloc_trace+0x52/0x320 [ 1266.394560][T26288] apply_wqattrs_prepare+0x5f/0x630 [ 1266.399796][T26288] ? vsnprintf+0xe8f/0xed0 [ 1266.404392][T26288] apply_workqueue_attrs+0x9e/0x100 [ 1266.409697][T26288] alloc_workqueue+0x777/0xad0 [ 1266.414474][T26288] ? disk_unblock_events+0x35/0x40 [ 1266.419610][T26288] ? bd_prepare_to_claim+0x1e6/0x270 [ 1266.424890][T26288] ? loop_attr_do_show_dio+0x70/0x70 [ 1266.430218][T26288] ? loop_set_status_from_info+0x35e/0x3a0 [ 1266.436119][T26288] loop_configure+0x681/0xeb0 [ 1266.440802][T26288] lo_ioctl+0x618/0x13e0 [ 1266.445037][T26288] ? path_openat+0x18d4/0x1ec0 [ 1266.449794][T26288] ? blkdev_common_ioctl+0x438/0x1110 [ 1266.455151][T26288] ? selinux_file_ioctl+0x981/0xa10 [ 1266.460340][T26288] ? lo_release+0x120/0x120 [ 1266.465054][T26288] blkdev_ioctl+0x1d0/0x3f0 [ 1266.469602][T26288] block_ioctl+0x6e/0x80 [ 1266.473828][T26288] ? blkdev_iopoll+0x80/0x80 [ 1266.478427][T26288] __se_sys_ioctl+0xcb/0x140 [ 1266.483024][T26288] __x64_sys_ioctl+0x3f/0x50 [ 1266.488381][T26288] do_syscall_64+0x44/0xa0 [ 1266.492881][T26288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1266.498789][T26288] RIP: 0033:0x4663b7 [ 1266.502859][T26288] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1266.522523][T26288] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1266.531089][T26288] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1266.539048][T26288] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1266.547009][T26288] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1266.555152][T26288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1266.563160][T26288] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:58:39 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:39 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:39 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1266.599305][T26277] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1266.610920][T26277] EXT4-fs (loop2): get root inode failed [ 1266.616582][T26277] EXT4-fs (loop2): mount failed [ 1266.632117][T26300] FAULT_INJECTION: forcing a failure. [ 1266.632117][T26300] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.644759][T26300] CPU: 0 PID: 26300 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1266.653528][T26300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.663587][T26300] Call Trace: [ 1266.666871][T26300] dump_stack_lvl+0xd6/0x122 [ 1266.668078][T26304] FAULT_INJECTION: forcing a failure. [ 1266.668078][T26304] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.671461][T26300] dump_stack+0x11/0x1b [ 1266.671487][T26300] should_fail+0x23c/0x250 [ 1266.693798][T26300] __should_failslab+0x81/0x90 [ 1266.698596][T26300] ? apply_wqattrs_prepare+0xbe/0x630 [ 1266.703954][T26300] should_failslab+0x5/0x20 [ 1266.708557][T26300] kmem_cache_alloc_trace+0x52/0x320 [ 1266.713828][T26300] ? apply_wqattrs_prepare+0x5f/0x630 [ 1266.719232][T26300] apply_wqattrs_prepare+0xbe/0x630 [ 1266.724457][T26300] ? vsnprintf+0xe8f/0xed0 [ 1266.728872][T26300] apply_workqueue_attrs+0x9e/0x100 [ 1266.734202][T26300] alloc_workqueue+0x777/0xad0 [ 1266.739000][T26300] ? disk_unblock_events+0x35/0x40 [ 1266.744109][T26300] ? bd_prepare_to_claim+0x1e6/0x270 [ 1266.749407][T26300] ? loop_attr_do_show_dio+0x70/0x70 [ 1266.754684][T26300] ? loop_set_status_from_info+0x35e/0x3a0 [ 1266.760498][T26300] loop_configure+0x681/0xeb0 [ 1266.765224][T26300] lo_ioctl+0x618/0x13e0 [ 1266.769456][T26300] ? path_openat+0x18d4/0x1ec0 [ 1266.774242][T26300] ? blkdev_common_ioctl+0x438/0x1110 [ 1266.779613][T26300] ? selinux_file_ioctl+0x981/0xa10 [ 1266.784807][T26300] ? lo_release+0x120/0x120 [ 1266.789337][T26300] blkdev_ioctl+0x1d0/0x3f0 [ 1266.793903][T26300] block_ioctl+0x6e/0x80 [ 1266.798131][T26300] ? blkdev_iopoll+0x80/0x80 [ 1266.802707][T26300] __se_sys_ioctl+0xcb/0x140 [ 1266.807285][T26300] __x64_sys_ioctl+0x3f/0x50 [ 1266.811864][T26300] do_syscall_64+0x44/0xa0 [ 1266.816387][T26300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1266.822328][T26300] RIP: 0033:0x4663b7 [ 1266.826661][T26300] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1266.846375][T26300] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1266.854779][T26300] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1266.862802][T26300] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1266.870900][T26300] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1266.878926][T26300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1266.886885][T26300] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:58:39 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1266.894848][T26304] CPU: 1 PID: 26304 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1266.903855][T26304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.905113][T26285] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1266.914012][T26304] Call Trace: [ 1266.914021][T26304] dump_stack_lvl+0xd6/0x122 [ 1266.914047][T26304] dump_stack+0x11/0x1b [ 1266.939132][T26304] should_fail+0x23c/0x250 [ 1266.943556][T26304] ? kzalloc+0x16/0x20 08:58:39 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1266.947725][T26304] __should_failslab+0x81/0x90 [ 1266.952056][T26285] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1266.952556][T26304] should_failslab+0x5/0x20 [ 1266.966326][T26304] __kmalloc+0x6f/0x350 [ 1266.970513][T26285] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1266.970549][T26304] ? _atomic_dec_and_lock+0x60/0xd0 [ 1266.986317][T26304] kzalloc+0x16/0x20 [ 1266.990219][T26304] alloc_workqueue+0x12f/0xad0 [ 1266.994997][T26304] ? disk_unblock_events+0x35/0x40 [ 1267.000419][T26304] ? bd_prepare_to_claim+0x1e6/0x270 [ 1267.005839][T26304] ? loop_attr_do_show_dio+0x70/0x70 [ 1267.007178][T26318] FAULT_INJECTION: forcing a failure. [ 1267.007178][T26318] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.011231][T26304] ? loop_set_status_from_info+0x35e/0x3a0 [ 1267.011262][T26304] loop_configure+0x681/0xeb0 [ 1267.034296][T26304] lo_ioctl+0x618/0x13e0 [ 1267.038629][T26304] ? path_openat+0x18d4/0x1ec0 [ 1267.043396][T26304] ? blkdev_common_ioctl+0x438/0x1110 [ 1267.048932][T26304] ? selinux_file_ioctl+0x981/0xa10 [ 1267.054128][T26304] ? lo_release+0x120/0x120 [ 1267.058625][T26304] blkdev_ioctl+0x1d0/0x3f0 [ 1267.063133][T26304] block_ioctl+0x6e/0x80 [ 1267.067363][T26304] ? blkdev_iopoll+0x80/0x80 [ 1267.072048][T26304] __se_sys_ioctl+0xcb/0x140 [ 1267.076630][T26304] __x64_sys_ioctl+0x3f/0x50 [ 1267.081209][T26304] do_syscall_64+0x44/0xa0 [ 1267.085709][T26304] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1267.091606][T26304] RIP: 0033:0x4663b7 [ 1267.095490][T26304] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.115691][T26304] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1267.124460][T26304] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1267.132433][T26304] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1267.140402][T26304] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1267.148396][T26304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1267.156528][T26304] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1267.164598][T26318] CPU: 0 PID: 26318 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1267.173367][T26318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.183429][T26318] Call Trace: [ 1267.186718][T26318] dump_stack_lvl+0xd6/0x122 [ 1267.191314][T26318] dump_stack+0x11/0x1b [ 1267.195469][T26318] should_fail+0x23c/0x250 08:58:39 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1267.199893][T26318] __should_failslab+0x81/0x90 [ 1267.204666][T26318] should_failslab+0x5/0x20 [ 1267.209221][T26318] kmem_cache_alloc_node+0x61/0x2c0 [ 1267.214423][T26318] ? alloc_unbound_pwq+0x3e6/0x780 [ 1267.216809][T26321] FAULT_INJECTION: forcing a failure. [ 1267.216809][T26321] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.219532][T26318] alloc_unbound_pwq+0x3e6/0x780 [ 1267.219556][T26318] apply_wqattrs_prepare+0x1ed/0x630 [ 1267.242662][T26318] ? vsnprintf+0xe8f/0xed0 [ 1267.247118][T26318] apply_workqueue_attrs+0x9e/0x100 [ 1267.252313][T26318] alloc_workqueue+0x777/0xad0 [ 1267.257071][T26318] ? disk_unblock_events+0x35/0x40 [ 1267.262226][T26318] ? bd_prepare_to_claim+0x1e6/0x270 [ 1267.267598][T26318] ? loop_attr_do_show_dio+0x70/0x70 [ 1267.272899][T26318] ? loop_set_status_from_info+0x35e/0x3a0 [ 1267.278943][T26318] loop_configure+0x681/0xeb0 [ 1267.283632][T26318] lo_ioctl+0x618/0x13e0 [ 1267.287866][T26318] ? path_openat+0x18d4/0x1ec0 [ 1267.292653][T26318] ? blkdev_common_ioctl+0x438/0x1110 [ 1267.298109][T26318] ? selinux_file_ioctl+0x981/0xa10 [ 1267.303386][T26318] ? lo_release+0x120/0x120 [ 1267.307881][T26318] blkdev_ioctl+0x1d0/0x3f0 [ 1267.312390][T26318] block_ioctl+0x6e/0x80 [ 1267.316694][T26318] ? blkdev_iopoll+0x80/0x80 [ 1267.321338][T26318] __se_sys_ioctl+0xcb/0x140 [ 1267.325930][T26318] __x64_sys_ioctl+0x3f/0x50 [ 1267.330599][T26318] do_syscall_64+0x44/0xa0 [ 1267.335016][T26318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1267.341139][T26318] RIP: 0033:0x4663b7 [ 1267.345020][T26318] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.364749][T26318] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1267.373202][T26318] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1267.381164][T26318] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1267.389167][T26318] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1267.397308][T26318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1267.405353][T26318] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1267.413314][T26321] CPU: 1 PID: 26321 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1267.422176][T26321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.432399][T26321] Call Trace: [ 1267.435675][T26321] dump_stack_lvl+0xd6/0x122 [ 1267.440286][T26321] dump_stack+0x11/0x1b [ 1267.444451][T26321] should_fail+0x23c/0x250 [ 1267.448856][T26321] __should_failslab+0x81/0x90 [ 1267.453671][T26321] ? alloc_workqueue+0x15d/0xad0 [ 1267.458598][T26321] should_failslab+0x5/0x20 [ 1267.463122][T26321] kmem_cache_alloc_trace+0x52/0x320 [ 1267.468522][T26321] alloc_workqueue+0x15d/0xad0 [ 1267.473272][T26321] ? disk_unblock_events+0x35/0x40 [ 1267.478366][T26321] ? bd_prepare_to_claim+0x1e6/0x270 [ 1267.483683][T26321] ? loop_attr_do_show_dio+0x70/0x70 [ 1267.489059][T26321] ? loop_set_status_from_info+0x35e/0x3a0 [ 1267.494946][T26321] loop_configure+0x681/0xeb0 [ 1267.499654][T26321] lo_ioctl+0x618/0x13e0 [ 1267.503974][T26321] ? path_openat+0x18d4/0x1ec0 [ 1267.508919][T26321] ? blkdev_common_ioctl+0x438/0x1110 [ 1267.514280][T26321] ? selinux_file_ioctl+0x981/0xa10 [ 1267.519520][T26321] ? lo_release+0x120/0x120 [ 1267.524081][T26321] blkdev_ioctl+0x1d0/0x3f0 [ 1267.528561][T26321] block_ioctl+0x6e/0x80 [ 1267.532799][T26321] ? blkdev_iopoll+0x80/0x80 [ 1267.537379][T26321] __se_sys_ioctl+0xcb/0x140 [ 1267.542030][T26321] __x64_sys_ioctl+0x3f/0x50 [ 1267.546608][T26321] do_syscall_64+0x44/0xa0 [ 1267.551052][T26321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1267.557000][T26321] RIP: 0033:0x4663b7 [ 1267.560869][T26321] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.580547][T26321] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1267.588954][T26321] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1267.596944][T26321] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1267.604896][T26321] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1267.612860][T26321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1267.620816][T26321] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:58:41 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000c, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:41 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:41 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1269.108567][T26340] FAULT_INJECTION: forcing a failure. [ 1269.108567][T26340] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.121232][T26340] CPU: 0 PID: 26340 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1269.130004][T26340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.140055][T26340] Call Trace: [ 1269.143510][T26340] dump_stack_lvl+0xd6/0x122 [ 1269.148139][T26340] dump_stack+0x11/0x1b [ 1269.152319][T26340] should_fail+0x23c/0x250 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1269.156752][T26340] ? kzalloc+0x16/0x20 [ 1269.160819][T26340] __should_failslab+0x81/0x90 [ 1269.165585][T26340] should_failslab+0x5/0x20 [ 1269.170160][T26340] __kmalloc+0x6f/0x350 [ 1269.174313][T26340] ? number+0xa13/0xb60 [ 1269.178473][T26340] kzalloc+0x16/0x20 [ 1269.182368][T26340] apply_wqattrs_prepare+0x3a/0x630 [ 1269.187560][T26340] ? vsnprintf+0xe8f/0xed0 [ 1269.191982][T26340] apply_workqueue_attrs+0x9e/0x100 [ 1269.197195][T26340] alloc_workqueue+0x777/0xad0 [ 1269.201966][T26340] ? disk_unblock_events+0x35/0x40 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1269.207136][T26340] ? bd_prepare_to_claim+0x1e6/0x270 [ 1269.212429][T26340] ? loop_attr_do_show_dio+0x70/0x70 [ 1269.217727][T26340] ? loop_set_status_from_info+0x35e/0x3a0 [ 1269.223541][T26340] loop_configure+0x681/0xeb0 [ 1269.228226][T26340] lo_ioctl+0x618/0x13e0 [ 1269.232473][T26340] ? path_openat+0x18d4/0x1ec0 [ 1269.237236][T26340] ? finish_task_switch+0xce/0x290 [ 1269.242343][T26340] ? blkdev_common_ioctl+0x438/0x1110 [ 1269.247715][T26340] ? selinux_file_ioctl+0x981/0xa10 [ 1269.252954][T26340] ? lo_release+0x120/0x120 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1401}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1269.257482][T26340] blkdev_ioctl+0x1d0/0x3f0 [ 1269.261990][T26340] block_ioctl+0x6e/0x80 [ 1269.266274][T26340] ? blkdev_iopoll+0x80/0x80 [ 1269.270919][T26340] __se_sys_ioctl+0xcb/0x140 [ 1269.275507][T26340] __x64_sys_ioctl+0x3f/0x50 [ 1269.280104][T26340] do_syscall_64+0x44/0xa0 [ 1269.284519][T26340] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.290451][T26340] RIP: 0033:0x4663b7 [ 1269.294346][T26340] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.314044][T26340] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1269.322506][T26340] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1269.330476][T26340] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1269.338508][T26340] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1269.346581][T26340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1269.354540][T26340] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1269.369414][T26344] loop2: detected capacity change from 0 to 264192 [ 1269.378015][T26348] FAULT_INJECTION: forcing a failure. [ 1269.378015][T26348] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.378194][T26349] loop3: detected capacity change from 0 to 264192 [ 1269.390784][T26348] CPU: 0 PID: 26348 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1269.406881][T26348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.416954][T26348] Call Trace: [ 1269.420230][T26348] dump_stack_lvl+0xd6/0x122 [ 1269.424909][T26348] dump_stack+0x11/0x1b [ 1269.429223][T26348] should_fail+0x23c/0x250 [ 1269.433648][T26348] __should_failslab+0x81/0x90 [ 1269.438435][T26348] ? kobject_uevent_env+0x1a7/0xc40 [ 1269.443661][T26348] should_failslab+0x5/0x20 [ 1269.448209][T26348] kmem_cache_alloc_trace+0x52/0x320 [ 1269.453499][T26348] ? dev_uevent_filter+0x70/0x70 [ 1269.458475][T26348] kobject_uevent_env+0x1a7/0xc40 [ 1269.463514][T26348] ? mutex_unlock+0x17/0x20 [ 1269.468288][T26348] ? alloc_workqueue+0xa18/0xad0 [ 1269.473291][T26348] disk_force_media_change+0xe3/0x170 [ 1269.478677][T26348] loop_configure+0x6c0/0xeb0 [ 1269.483444][T26348] lo_ioctl+0x618/0x13e0 [ 1269.487771][T26348] ? path_openat+0x18d4/0x1ec0 [ 1269.492166][T26349] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1269.492551][T26348] ? blkdev_common_ioctl+0x438/0x1110 [ 1269.509317][T26349] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1269.510732][T26348] ? selinux_file_ioctl+0x981/0xa10 [ 1269.510762][T26348] ? lo_release+0x120/0x120 [ 1269.520414][T26349] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1269.525285][T26348] blkdev_ioctl+0x1d0/0x3f0 [ 1269.525309][T26348] block_ioctl+0x6e/0x80 [ 1269.549146][T26348] ? blkdev_iopoll+0x80/0x80 [ 1269.552792][T26344] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1269.553738][T26348] __se_sys_ioctl+0xcb/0x140 [ 1269.553765][T26348] __x64_sys_ioctl+0x3f/0x50 [ 1269.565224][T26344] EXT4-fs (loop2): get root inode failed [ 1269.569756][T26348] do_syscall_64+0x44/0xa0 [ 1269.574457][T26344] EXT4-fs (loop2): mount failed [ 1269.589369][T26348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.595345][T26348] RIP: 0033:0x4663b7 [ 1269.599224][T26348] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.618816][T26348] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1269.627614][T26348] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1269.635933][T26348] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1269.643886][T26348] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1269.651930][T26348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1269.659891][T26348] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1269.670015][T26348] loop0: detected capacity change from 0 to 264192 [ 1269.679131][T26348] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1269.693597][T26348] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1269.716328][T26348] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:44 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d02}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:44 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000d, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:44 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1272.133328][T26411] FAULT_INJECTION: forcing a failure. [ 1272.133328][T26411] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.145968][T26411] CPU: 1 PID: 26411 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1272.154787][T26411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.164874][T26411] Call Trace: [ 1272.168153][T26411] dump_stack_lvl+0xd6/0x122 [ 1272.172754][T26411] dump_stack+0x11/0x1b [ 1272.176952][T26411] should_fail+0x23c/0x250 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1272.181398][T26411] __should_failslab+0x81/0x90 [ 1272.186197][T26411] ? apply_wqattrs_prepare+0x5f/0x630 [ 1272.191651][T26411] should_failslab+0x5/0x20 [ 1272.196162][T26411] kmem_cache_alloc_trace+0x52/0x320 [ 1272.201496][T26411] apply_wqattrs_prepare+0x5f/0x630 [ 1272.206763][T26411] ? vsnprintf+0xe8f/0xed0 [ 1272.211211][T26411] apply_workqueue_attrs+0x9e/0x100 [ 1272.216447][T26411] alloc_workqueue+0x777/0xad0 [ 1272.221323][T26411] ? disk_unblock_events+0x35/0x40 [ 1272.226445][T26411] ? bd_prepare_to_claim+0x1e6/0x270 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1272.231795][T26411] ? loop_attr_do_show_dio+0x70/0x70 [ 1272.237130][T26411] ? loop_set_status_from_info+0x35e/0x3a0 [ 1272.244681][T26411] loop_configure+0x681/0xeb0 [ 1272.249386][T26411] lo_ioctl+0x618/0x13e0 [ 1272.253644][T26411] ? path_openat+0x18d4/0x1ec0 [ 1272.258434][T26411] ? blkdev_common_ioctl+0x438/0x1110 [ 1272.263830][T26411] ? selinux_file_ioctl+0x981/0xa10 [ 1272.269045][T26411] ? lo_release+0x120/0x120 [ 1272.273599][T26411] blkdev_ioctl+0x1d0/0x3f0 [ 1272.278190][T26411] block_ioctl+0x6e/0x80 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1272.282436][T26411] ? blkdev_iopoll+0x80/0x80 [ 1272.287032][T26411] __se_sys_ioctl+0xcb/0x140 [ 1272.291629][T26411] __x64_sys_ioctl+0x3f/0x50 [ 1272.296218][T26411] do_syscall_64+0x44/0xa0 [ 1272.300649][T26411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1272.306597][T26411] RIP: 0033:0x4663b7 [ 1272.310491][T26411] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:58:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1272.330099][T26411] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1272.338535][T26411] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1272.346513][T26411] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1272.354931][T26411] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1272.362900][T26411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1272.370866][T26411] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1272.391559][T26415] FAULT_INJECTION: forcing a failure. [ 1272.391559][T26415] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.391949][T26416] loop2: detected capacity change from 0 to 264192 [ 1272.404304][T26415] CPU: 0 PID: 26415 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1272.412597][T26413] loop3: detected capacity change from 0 to 264192 [ 1272.421184][T26415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.421199][T26415] Call Trace: [ 1272.421206][T26415] dump_stack_lvl+0xd6/0x122 [ 1272.421231][T26415] dump_stack+0x11/0x1b [ 1272.449812][T26415] should_fail+0x23c/0x250 [ 1272.454251][T26415] ? kzalloc+0x1d/0x30 [ 1272.458335][T26415] __should_failslab+0x81/0x90 [ 1272.463132][T26415] should_failslab+0x5/0x20 [ 1272.467699][T26415] __kmalloc+0x6f/0x350 [ 1272.471955][T26415] kzalloc+0x1d/0x30 [ 1272.475858][T26415] kobject_get_path+0x7c/0x110 [ 1272.480714][T26415] kobject_uevent_env+0x1be/0xc40 [ 1272.485736][T26415] ? mutex_unlock+0x17/0x20 [ 1272.490277][T26415] ? alloc_workqueue+0xa18/0xad0 [ 1272.495377][T26415] disk_force_media_change+0xe3/0x170 [ 1272.500768][T26415] loop_configure+0x6c0/0xeb0 [ 1272.505506][T26415] lo_ioctl+0x618/0x13e0 [ 1272.509756][T26415] ? path_openat+0x18d4/0x1ec0 [ 1272.514543][T26415] ? blkdev_common_ioctl+0x438/0x1110 [ 1272.519922][T26415] ? selinux_file_ioctl+0x981/0xa10 [ 1272.525144][T26415] ? lo_release+0x120/0x120 [ 1272.529670][T26415] blkdev_ioctl+0x1d0/0x3f0 [ 1272.534275][T26415] block_ioctl+0x6e/0x80 [ 1272.538527][T26415] ? blkdev_iopoll+0x80/0x80 [ 1272.543121][T26415] __se_sys_ioctl+0xcb/0x140 [ 1272.547703][T26415] __x64_sys_ioctl+0x3f/0x50 [ 1272.552349][T26415] do_syscall_64+0x44/0xa0 [ 1272.556933][T26415] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1272.562909][T26415] RIP: 0033:0x4663b7 [ 1272.566971][T26415] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1272.586576][T26415] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1272.594979][T26415] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1272.603052][T26415] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1272.611377][T26415] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1272.619363][T26415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1272.627495][T26415] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1272.652611][T26415] loop0: detected capacity change from 0 to 264192 [ 1272.660452][T26416] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1272.672187][T26416] EXT4-fs (loop2): get root inode failed [ 1272.677855][T26416] EXT4-fs (loop2): mount failed [ 1272.685020][T26413] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1272.707768][T26413] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1272.707850][T26415] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1272.730554][T26415] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1272.731956][T26413] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1272.740953][T26415] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:47 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:47 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4803}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:47 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1275.157753][T26477] loop2: detected capacity change from 0 to 264192 [ 1275.165992][T26478] loop3: detected capacity change from 0 to 264192 [ 1275.173519][T26484] FAULT_INJECTION: forcing a failure. [ 1275.173519][T26484] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.186183][T26484] CPU: 0 PID: 26484 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1275.195034][T26484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.205090][T26484] Call Trace: [ 1275.206593][T26486] FAULT_INJECTION: forcing a failure. [ 1275.206593][T26486] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.208403][T26484] dump_stack_lvl+0xd6/0x122 [ 1275.226405][T26484] dump_stack+0x11/0x1b [ 1275.230653][T26484] should_fail+0x23c/0x250 [ 1275.235080][T26484] __should_failslab+0x81/0x90 [ 1275.239862][T26484] should_failslab+0x5/0x20 [ 1275.244366][T26484] kmem_cache_alloc_node+0x61/0x2c0 [ 1275.249569][T26484] ? __alloc_skb+0xed/0x420 [ 1275.254162][T26484] __alloc_skb+0xed/0x420 [ 1275.258482][T26484] alloc_uevent_skb+0x5b/0x120 [ 1275.263279][T26484] kobject_uevent_env+0x863/0xc40 [ 1275.268306][T26484] disk_force_media_change+0xe3/0x170 [ 1275.273687][T26484] loop_configure+0x6c0/0xeb0 [ 1275.278367][T26484] lo_ioctl+0x618/0x13e0 [ 1275.282725][T26484] ? path_openat+0x18d4/0x1ec0 [ 1275.287544][T26484] ? blkdev_common_ioctl+0x438/0x1110 [ 1275.292926][T26484] ? selinux_file_ioctl+0x981/0xa10 [ 1275.298176][T26484] ? lo_release+0x120/0x120 [ 1275.302720][T26484] blkdev_ioctl+0x1d0/0x3f0 [ 1275.307645][T26484] block_ioctl+0x6e/0x80 [ 1275.311878][T26484] ? blkdev_iopoll+0x80/0x80 [ 1275.316460][T26484] __se_sys_ioctl+0xcb/0x140 [ 1275.321051][T26484] __x64_sys_ioctl+0x3f/0x50 [ 1275.325741][T26484] do_syscall_64+0x44/0xa0 [ 1275.331166][T26484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1275.337247][T26484] RIP: 0033:0x4663b7 [ 1275.341141][T26484] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1275.360848][T26484] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1275.369265][T26484] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1275.377261][T26484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1275.385256][T26484] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1275.393230][T26484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:58:47 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1275.401249][T26484] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1275.409247][T26486] CPU: 1 PID: 26486 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1275.418416][T26486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.428585][T26486] Call Trace: [ 1275.431864][T26486] dump_stack_lvl+0xd6/0x122 [ 1275.436477][T26486] dump_stack+0x11/0x1b [ 1275.441070][T26486] should_fail+0x23c/0x250 [ 1275.443515][T26484] loop0: detected capacity change from 0 to 264192 [ 1275.445502][T26486] __should_failslab+0x81/0x90 [ 1275.456743][T26486] ? apply_wqattrs_prepare+0xbe/0x630 [ 1275.462275][T26486] should_failslab+0x5/0x20 [ 1275.466810][T26486] kmem_cache_alloc_trace+0x52/0x320 [ 1275.472098][T26486] ? apply_wqattrs_prepare+0x5f/0x630 [ 1275.477553][T26486] apply_wqattrs_prepare+0xbe/0x630 [ 1275.482745][T26486] ? vsnprintf+0xe8f/0xed0 [ 1275.487153][T26486] apply_workqueue_attrs+0x9e/0x100 [ 1275.492442][T26486] alloc_workqueue+0x777/0xad0 [ 1275.497218][T26486] ? disk_unblock_events+0x35/0x40 [ 1275.502326][T26486] ? bd_prepare_to_claim+0x1e6/0x270 [ 1275.507604][T26486] ? loop_attr_do_show_dio+0x70/0x70 [ 1275.512883][T26486] ? loop_set_status_from_info+0x35e/0x3a0 [ 1275.518682][T26486] loop_configure+0x681/0xeb0 [ 1275.523387][T26486] lo_ioctl+0x618/0x13e0 [ 1275.527621][T26486] ? path_openat+0x18d4/0x1ec0 [ 1275.532430][T26486] ? blkdev_common_ioctl+0x438/0x1110 [ 1275.537792][T26486] ? selinux_file_ioctl+0x981/0xa10 [ 1275.543105][T26486] ? lo_release+0x120/0x120 [ 1275.547598][T26486] blkdev_ioctl+0x1d0/0x3f0 [ 1275.552093][T26486] block_ioctl+0x6e/0x80 [ 1275.556399][T26486] ? blkdev_iopoll+0x80/0x80 [ 1275.560975][T26486] __se_sys_ioctl+0xcb/0x140 [ 1275.565568][T26486] __x64_sys_ioctl+0x3f/0x50 [ 1275.570176][T26486] do_syscall_64+0x44/0xa0 [ 1275.574585][T26486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1275.580479][T26486] RIP: 0033:0x4663b7 [ 1275.584373][T26486] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1275.603971][T26486] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1275.612380][T26486] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1275.620431][T26486] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1275.628399][T26486] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1275.636372][T26486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1275.644529][T26486] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:58:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1275.653448][T26478] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1275.691065][T26477] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block 08:58:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1275.697732][T26478] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1275.702591][T26477] EXT4-fs (loop2): get root inode failed [ 1275.717364][T26477] EXT4-fs (loop2): mount failed [ 1275.723698][T26484] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature 08:58:48 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1275.765856][T26484] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1275.766389][T26478] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1275.787007][T26484] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:48 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1275.813127][T26513] FAULT_INJECTION: forcing a failure. [ 1275.813127][T26513] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.825765][T26513] CPU: 1 PID: 26513 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1275.834522][T26513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.844580][T26513] Call Trace: [ 1275.847871][T26513] dump_stack_lvl+0xd6/0x122 [ 1275.852494][T26513] dump_stack+0x11/0x1b [ 1275.856653][T26513] should_fail+0x23c/0x250 [ 1275.861135][T26513] __should_failslab+0x81/0x90 08:58:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000011, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1275.865929][T26513] should_failslab+0x5/0x20 [ 1275.870445][T26513] kmem_cache_alloc_node+0x61/0x2c0 [ 1275.875691][T26513] ? alloc_unbound_pwq+0x3e6/0x780 [ 1275.880811][T26513] alloc_unbound_pwq+0x3e6/0x780 [ 1275.885848][T26513] apply_wqattrs_prepare+0x1ed/0x630 [ 1275.891230][T26513] ? vsnprintf+0xe8f/0xed0 [ 1275.895673][T26513] apply_workqueue_attrs+0x9e/0x100 [ 1275.900964][T26513] alloc_workqueue+0x777/0xad0 [ 1275.905813][T26513] ? disk_unblock_events+0x35/0x40 [ 1275.910935][T26513] ? bd_prepare_to_claim+0x1e6/0x270 [ 1275.916280][T26513] ? loop_attr_do_show_dio+0x70/0x70 [ 1275.921606][T26513] ? loop_set_status_from_info+0x35e/0x3a0 [ 1275.927505][T26513] loop_configure+0x681/0xeb0 [ 1275.932207][T26513] lo_ioctl+0x618/0x13e0 [ 1275.936547][T26513] ? path_openat+0x18d4/0x1ec0 [ 1275.941400][T26513] ? blkdev_common_ioctl+0x438/0x1110 [ 1275.946851][T26513] ? selinux_file_ioctl+0x981/0xa10 [ 1275.952209][T26513] ? lo_release+0x120/0x120 [ 1275.956895][T26513] blkdev_ioctl+0x1d0/0x3f0 [ 1275.961384][T26513] block_ioctl+0x6e/0x80 [ 1275.965707][T26513] ? blkdev_iopoll+0x80/0x80 [ 1275.970283][T26513] __se_sys_ioctl+0xcb/0x140 [ 1275.974908][T26513] __x64_sys_ioctl+0x3f/0x50 [ 1275.979484][T26513] do_syscall_64+0x44/0xa0 [ 1275.983882][T26513] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1275.989777][T26513] RIP: 0033:0x4663b7 [ 1275.993664][T26513] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.013264][T26513] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.021662][T26513] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1276.029829][T26513] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1276.037793][T26513] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1276.046096][T26513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1276.054105][T26513] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1276.063628][T26528] loop2: detected capacity change from 0 to 264192 [ 1276.086874][T26528] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1276.098484][T26528] EXT4-fs (loop2): get root inode failed [ 1276.104116][T26528] EXT4-fs (loop2): mount failed [ 1276.138289][T26543] FAULT_INJECTION: forcing a failure. [ 1276.138289][T26543] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.150979][T26543] CPU: 1 PID: 26543 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1276.159809][T26543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.169843][T26543] Call Trace: [ 1276.173102][T26543] dump_stack_lvl+0xd6/0x122 [ 1276.177673][T26543] dump_stack+0x11/0x1b [ 1276.182011][T26543] should_fail+0x23c/0x250 [ 1276.186406][T26543] __should_failslab+0x81/0x90 [ 1276.191151][T26543] should_failslab+0x5/0x20 [ 1276.195653][T26543] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1276.201349][T26543] ? __kmalloc_node_track_caller+0x30/0x40 [ 1276.207144][T26543] __kmalloc_node_track_caller+0x30/0x40 [ 1276.212756][T26543] ? alloc_uevent_skb+0x5b/0x120 [ 1276.217763][T26543] __alloc_skb+0x187/0x420 [ 1276.222158][T26543] alloc_uevent_skb+0x5b/0x120 [ 1276.226932][T26543] kobject_uevent_env+0x863/0xc40 [ 1276.231951][T26543] disk_force_media_change+0xe3/0x170 [ 1276.237318][T26543] loop_configure+0x6c0/0xeb0 [ 1276.242011][T26543] lo_ioctl+0x618/0x13e0 [ 1276.246238][T26543] ? path_openat+0x18d4/0x1ec0 [ 1276.250993][T26543] ? blkdev_common_ioctl+0x438/0x1110 [ 1276.256500][T26543] ? selinux_file_ioctl+0x981/0xa10 [ 1276.261688][T26543] ? lo_release+0x120/0x120 [ 1276.266265][T26543] blkdev_ioctl+0x1d0/0x3f0 [ 1276.270748][T26543] block_ioctl+0x6e/0x80 [ 1276.274964][T26543] ? blkdev_iopoll+0x80/0x80 [ 1276.279531][T26543] __se_sys_ioctl+0xcb/0x140 [ 1276.284235][T26543] __x64_sys_ioctl+0x3f/0x50 [ 1276.288899][T26543] do_syscall_64+0x44/0xa0 [ 1276.293317][T26543] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1276.299262][T26543] RIP: 0033:0x4663b7 [ 1276.303140][T26543] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.322740][T26543] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.331148][T26543] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1276.339273][T26543] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1276.347226][T26543] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1276.355184][T26543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1276.363138][T26543] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1276.381928][T26543] loop0: detected capacity change from 0 to 264192 [ 1276.403835][T26543] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1276.417412][T26543] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1276.427849][T26543] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:50 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:50 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000012, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:50 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1278.207238][T26564] FAULT_INJECTION: forcing a failure. [ 1278.207238][T26564] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.207684][T26563] FAULT_INJECTION: forcing a failure. [ 1278.207684][T26563] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.219886][T26564] CPU: 1 PID: 26564 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1278.241177][T26564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.251227][T26564] Call Trace: [ 1278.254590][T26564] dump_stack_lvl+0xd6/0x122 [ 1278.259174][T26564] dump_stack+0x11/0x1b [ 1278.263320][T26564] should_fail+0x23c/0x250 [ 1278.267779][T26564] __should_failslab+0x81/0x90 [ 1278.272531][T26564] ? kobject_uevent_env+0x1a7/0xc40 [ 1278.277784][T26564] should_failslab+0x5/0x20 [ 1278.282284][T26564] kmem_cache_alloc_trace+0x52/0x320 [ 1278.287570][T26564] ? pwq_adjust_max_active+0x491/0x4b0 [ 1278.293021][T26564] ? dev_uevent_filter+0x70/0x70 [ 1278.297952][T26564] kobject_uevent_env+0x1a7/0xc40 [ 1278.302968][T26564] ? __list_add_valid+0x28/0x90 [ 1278.307809][T26564] ? alloc_workqueue+0xa18/0xad0 [ 1278.312739][T26564] disk_force_media_change+0xe3/0x170 [ 1278.318111][T26564] loop_configure+0x6c0/0xeb0 [ 1278.322781][T26564] lo_ioctl+0x618/0x13e0 [ 1278.327012][T26564] ? path_openat+0x18d4/0x1ec0 [ 1278.331840][T26564] ? blkdev_common_ioctl+0x438/0x1110 [ 1278.337369][T26564] ? selinux_file_ioctl+0x981/0xa10 [ 1278.342656][T26564] ? lo_release+0x120/0x120 [ 1278.347166][T26564] blkdev_ioctl+0x1d0/0x3f0 [ 1278.351752][T26564] block_ioctl+0x6e/0x80 [ 1278.355982][T26564] ? blkdev_iopoll+0x80/0x80 [ 1278.360557][T26564] __se_sys_ioctl+0xcb/0x140 [ 1278.365134][T26564] __x64_sys_ioctl+0x3f/0x50 [ 1278.370023][T26564] do_syscall_64+0x44/0xa0 [ 1278.374442][T26564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1278.380356][T26564] RIP: 0033:0x4663b7 [ 1278.384236][T26564] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.403827][T26564] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1278.412227][T26564] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1278.420225][T26564] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1278.428197][T26564] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1278.436294][T26564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1278.444253][T26564] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1278.452216][T26563] CPU: 0 PID: 26563 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1278.460978][T26563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.462493][T26564] loop5: detected capacity change from 0 to 264192 [ 1278.471113][T26563] Call Trace: [ 1278.471121][T26563] dump_stack_lvl+0xd6/0x122 [ 1278.471145][T26563] dump_stack+0x11/0x1b [ 1278.489870][T26563] should_fail+0x23c/0x250 [ 1278.494301][T26563] ? skb_clone+0x12c/0x1f0 [ 1278.498717][T26563] __should_failslab+0x81/0x90 [ 1278.503550][T26563] should_failslab+0x5/0x20 08:58:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d03}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1278.508056][T26563] kmem_cache_alloc+0x4f/0x300 [ 1278.512974][T26563] skb_clone+0x12c/0x1f0 [ 1278.517316][T26563] netlink_broadcast_filtered+0x4fd/0xb60 [ 1278.523038][T26563] ? skb_put+0xb9/0xf0 [ 1278.527158][T26563] netlink_broadcast+0x35/0x50 [ 1278.531968][T26563] kobject_uevent_env+0x8c9/0xc40 [ 1278.537057][T26563] disk_force_media_change+0xe3/0x170 [ 1278.542438][T26563] loop_configure+0x6c0/0xeb0 [ 1278.547117][T26563] lo_ioctl+0x618/0x13e0 [ 1278.551347][T26563] ? path_openat+0x18d4/0x1ec0 08:58:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb401}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd502}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1278.556124][T26563] ? blkdev_common_ioctl+0x438/0x1110 [ 1278.561496][T26563] ? selinux_file_ioctl+0x981/0xa10 [ 1278.566707][T26563] ? lo_release+0x120/0x120 [ 1278.571219][T26563] blkdev_ioctl+0x1d0/0x3f0 [ 1278.576165][T26563] block_ioctl+0x6e/0x80 [ 1278.580517][T26563] ? blkdev_iopoll+0x80/0x80 [ 1278.585106][T26563] __se_sys_ioctl+0xcb/0x140 [ 1278.589787][T26563] __x64_sys_ioctl+0x3f/0x50 [ 1278.594383][T26563] do_syscall_64+0x44/0xa0 [ 1278.598828][T26563] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1278.604749][T26563] RIP: 0033:0x4663b7 08:58:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea02}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1278.608655][T26563] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.628263][T26563] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1278.636872][T26563] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1278.645029][T26563] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1278.652989][T26563] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1278.660949][T26563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1278.669079][T26563] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1278.677549][T26563] loop0: detected capacity change from 0 to 264192 [ 1278.684995][T26565] loop3: detected capacity change from 0 to 264192 [ 1278.691824][T26568] loop2: detected capacity change from 0 to 264192 [ 1278.704064][T26563] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1278.710831][T26565] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1278.717984][T26564] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1278.730070][T26565] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1278.744828][T26568] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1278.752123][T26563] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1278.763454][T26568] EXT4-fs (loop2): get root inode failed [ 1278.763466][T26568] EXT4-fs (loop2): mount failed [ 1278.784013][T26564] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1278.795484][T26563] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1278.813303][T26564] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1278.824726][T26565] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:53 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:53 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefff}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:53 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:53 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140000fe, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1281.514071][T26626] loop2: detected capacity change from 0 to 264192 [ 1281.517823][T26629] FAULT_INJECTION: forcing a failure. [ 1281.517823][T26629] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.521086][T26627] FAULT_INJECTION: forcing a failure. [ 1281.521086][T26627] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.533225][T26629] CPU: 1 PID: 26629 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1281.554610][T26629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.564723][T26629] Call Trace: [ 1281.568108][T26629] dump_stack_lvl+0xd6/0x122 [ 1281.572702][T26629] dump_stack+0x11/0x1b [ 1281.576947][T26629] should_fail+0x23c/0x250 [ 1281.581373][T26629] ? kzalloc+0x1d/0x30 [ 1281.585473][T26629] __should_failslab+0x81/0x90 [ 1281.590233][T26629] should_failslab+0x5/0x20 [ 1281.594726][T26629] __kmalloc+0x6f/0x350 [ 1281.598872][T26629] kzalloc+0x1d/0x30 [ 1281.602765][T26629] kobject_get_path+0x7c/0x110 [ 1281.607520][T26629] kobject_uevent_env+0x1be/0xc40 [ 1281.612538][T26629] ? __list_add_valid+0x28/0x90 [ 1281.617377][T26629] ? alloc_workqueue+0xa18/0xad0 [ 1281.622304][T26629] disk_force_media_change+0xe3/0x170 [ 1281.627753][T26629] loop_configure+0x6c0/0xeb0 [ 1281.632506][T26629] lo_ioctl+0x618/0x13e0 [ 1281.636751][T26629] ? path_openat+0x18d4/0x1ec0 [ 1281.641534][T26629] ? blkdev_common_ioctl+0x438/0x1110 [ 1281.646899][T26629] ? selinux_file_ioctl+0x981/0xa10 [ 1281.652148][T26629] ? lo_release+0x120/0x120 [ 1281.656652][T26629] blkdev_ioctl+0x1d0/0x3f0 [ 1281.661144][T26629] block_ioctl+0x6e/0x80 [ 1281.665443][T26629] ? blkdev_iopoll+0x80/0x80 [ 1281.670017][T26629] __se_sys_ioctl+0xcb/0x140 [ 1281.674598][T26629] __x64_sys_ioctl+0x3f/0x50 [ 1281.679178][T26629] do_syscall_64+0x44/0xa0 [ 1281.683745][T26629] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1281.689699][T26629] RIP: 0033:0x4663b7 [ 1281.693576][T26629] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1281.713170][T26629] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1281.721572][T26629] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1281.729602][T26629] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1281.737559][T26629] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1281.745516][T26629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1281.753471][T26629] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1281.761432][T26627] CPU: 0 PID: 26627 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1281.770286][T26627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.775443][T26631] loop3: detected capacity change from 0 to 264192 [ 1281.780601][T26627] Call Trace: [ 1281.780611][T26627] dump_stack_lvl+0xd6/0x122 [ 1281.780637][T26627] dump_stack+0x11/0x1b [ 1281.799071][T26627] should_fail+0x23c/0x250 [ 1281.803517][T26627] __should_failslab+0x81/0x90 [ 1281.808276][T26627] ? call_usermodehelper_setup+0x71/0x190 [ 1281.813995][T26627] should_failslab+0x5/0x20 [ 1281.818493][T26627] kmem_cache_alloc_trace+0x52/0x320 [ 1281.823782][T26627] call_usermodehelper_setup+0x71/0x190 [ 1281.829334][T26627] ? add_uevent_var+0x1d0/0x1d0 [ 1281.834188][T26627] kobject_uevent_env+0xb29/0xc40 [ 1281.839207][T26627] disk_force_media_change+0xe3/0x170 [ 1281.844577][T26627] loop_configure+0x6c0/0xeb0 [ 1281.849286][T26627] lo_ioctl+0x618/0x13e0 [ 1281.853521][T26627] ? path_openat+0x18d4/0x1ec0 [ 1281.858385][T26627] ? blkdev_common_ioctl+0x438/0x1110 [ 1281.864176][T26627] ? selinux_file_ioctl+0x981/0xa10 [ 1281.869447][T26627] ? lo_release+0x120/0x120 [ 1281.874478][T26627] blkdev_ioctl+0x1d0/0x3f0 [ 1281.878990][T26627] block_ioctl+0x6e/0x80 [ 1281.883216][T26627] ? blkdev_iopoll+0x80/0x80 [ 1281.887969][T26627] __se_sys_ioctl+0xcb/0x140 [ 1281.892593][T26627] __x64_sys_ioctl+0x3f/0x50 [ 1281.897183][T26627] do_syscall_64+0x44/0xa0 [ 1281.901628][T26627] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1281.907880][T26627] RIP: 0033:0x4663b7 [ 1281.911769][T26627] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1281.931452][T26627] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1281.939896][T26627] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1281.948383][T26627] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1281.956355][T26627] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1281.964518][T26627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1281.972505][T26627] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1281.986688][T26627] loop0: detected capacity change from 0 to 264192 [ 1282.002568][T26629] loop5: detected capacity change from 0 to 264192 08:58:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1282.003543][T26626] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1282.012281][T26627] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1282.020738][T26626] EXT4-fs (loop2): get root inode failed [ 1282.020753][T26626] EXT4-fs (loop2): mount failed [ 1282.066487][T26629] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1282.070127][T26631] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1282.079518][T26629] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 08:58:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:54 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1282.122401][T26627] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1282.126528][T26629] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1282.137581][T26631] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 08:58:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffef}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1282.163859][T26627] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1282.166603][T26631] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:54 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1282.272316][T26670] FAULT_INJECTION: forcing a failure. [ 1282.272316][T26670] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.284960][T26670] CPU: 1 PID: 26670 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1282.293735][T26670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.303872][T26670] Call Trace: [ 1282.307133][T26670] dump_stack_lvl+0xd6/0x122 [ 1282.311704][T26670] dump_stack+0x11/0x1b [ 1282.315836][T26670] should_fail+0x23c/0x250 [ 1282.320243][T26670] __should_failslab+0x81/0x90 [ 1282.324987][T26670] should_failslab+0x5/0x20 [ 1282.329562][T26670] kmem_cache_alloc_node+0x61/0x2c0 [ 1282.334740][T26670] ? __alloc_skb+0xed/0x420 [ 1282.339220][T26670] __alloc_skb+0xed/0x420 [ 1282.343527][T26670] alloc_uevent_skb+0x5b/0x120 [ 1282.348280][T26670] kobject_uevent_env+0x863/0xc40 [ 1282.353735][T26670] disk_force_media_change+0xe3/0x170 [ 1282.359109][T26670] loop_configure+0x6c0/0xeb0 [ 1282.363769][T26670] lo_ioctl+0x618/0x13e0 [ 1282.368009][T26670] ? path_openat+0x18d4/0x1ec0 [ 1282.372815][T26670] ? blkdev_common_ioctl+0x438/0x1110 [ 1282.378202][T26670] ? selinux_file_ioctl+0x981/0xa10 [ 1282.383379][T26670] ? lo_release+0x120/0x120 [ 1282.387864][T26670] blkdev_ioctl+0x1d0/0x3f0 [ 1282.392384][T26670] block_ioctl+0x6e/0x80 [ 1282.396614][T26670] ? blkdev_iopoll+0x80/0x80 [ 1282.401234][T26670] __se_sys_ioctl+0xcb/0x140 [ 1282.405815][T26670] __x64_sys_ioctl+0x3f/0x50 [ 1282.410412][T26670] do_syscall_64+0x44/0xa0 [ 1282.414815][T26670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.420703][T26670] RIP: 0033:0x4663b7 [ 1282.424656][T26670] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.444241][T26670] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.452695][T26670] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1282.460653][T26670] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1282.468705][T26670] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1282.476659][T26670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1282.484700][T26670] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1282.500222][T26670] loop5: detected capacity change from 0 to 264192 [ 1282.524511][T26670] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1282.538426][T26683] FAULT_INJECTION: forcing a failure. [ 1282.538426][T26683] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.540686][T26670] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1282.551058][T26683] CPU: 0 PID: 26683 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1282.562085][T26670] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1282.568905][T26683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.568918][T26683] Call Trace: [ 1282.568924][T26683] dump_stack_lvl+0xd6/0x122 [ 1282.568949][T26683] dump_stack+0x11/0x1b [ 1282.568979][T26683] should_fail+0x23c/0x250 [ 1282.605901][T26683] ? __kernfs_new_node+0x6a/0x330 [ 1282.610936][T26683] __should_failslab+0x81/0x90 [ 1282.615687][T26683] should_failslab+0x5/0x20 [ 1282.620251][T26683] kmem_cache_alloc+0x4f/0x300 [ 1282.624997][T26683] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 1282.630826][T26683] __kernfs_new_node+0x6a/0x330 [ 1282.635659][T26683] ? ___cache_free+0x3c/0x300 [ 1282.640320][T26683] ? kfree+0xf8/0x1d0 [ 1282.644358][T26683] kernfs_create_dir_ns+0x5e/0x140 [ 1282.649462][T26683] internal_create_group+0x148/0x860 [ 1282.654842][T26683] ? __invalidate_device+0xb0/0xc0 [ 1282.659930][T26683] ? set_disk_ro+0x73/0x110 [ 1282.664408][T26683] sysfs_create_group+0x1b/0x20 [ 1282.669239][T26683] loop_configure+0xbcd/0xeb0 [ 1282.673900][T26683] lo_ioctl+0x618/0x13e0 [ 1282.678185][T26683] ? path_openat+0x18d4/0x1ec0 [ 1282.682937][T26683] ? blkdev_common_ioctl+0x438/0x1110 [ 1282.688287][T26683] ? selinux_file_ioctl+0x981/0xa10 [ 1282.693526][T26683] ? lo_release+0x120/0x120 [ 1282.698062][T26683] blkdev_ioctl+0x1d0/0x3f0 [ 1282.702541][T26683] block_ioctl+0x6e/0x80 [ 1282.706761][T26683] ? blkdev_iopoll+0x80/0x80 [ 1282.711392][T26683] __se_sys_ioctl+0xcb/0x140 [ 1282.715962][T26683] __x64_sys_ioctl+0x3f/0x50 [ 1282.720563][T26683] do_syscall_64+0x44/0xa0 [ 1282.724971][T26683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.730843][T26683] RIP: 0033:0x4663b7 [ 1282.734712][T26683] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.754306][T26683] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.762699][T26683] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1282.770653][T26683] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1282.778658][T26683] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1282.786609][T26683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1282.794661][T26683] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1282.802746][T26683] loop0: detected capacity change from 0 to 264192 [ 1282.813904][T26683] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1282.827650][T26683] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1282.837784][T26683] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000011, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000104, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:56 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:56 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:56 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1284.534569][T26702] loop2: detected capacity change from 0 to 264192 [ 1284.537595][T26705] FAULT_INJECTION: forcing a failure. [ 1284.537595][T26705] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.553839][T26705] CPU: 1 PID: 26705 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1284.562851][T26705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.572900][T26705] Call Trace: [ 1284.576177][T26705] dump_stack_lvl+0xd6/0x122 [ 1284.580774][T26705] dump_stack+0x11/0x1b [ 1284.585109][T26705] should_fail+0x23c/0x250 [ 1284.589513][T26705] __should_failslab+0x81/0x90 [ 1284.594267][T26705] should_failslab+0x5/0x20 [ 1284.598782][T26705] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1284.604504][T26705] ? __kmalloc_node_track_caller+0x30/0x40 [ 1284.610297][T26705] __kmalloc_node_track_caller+0x30/0x40 [ 1284.615934][T26705] ? alloc_uevent_skb+0x5b/0x120 [ 1284.620906][T26705] __alloc_skb+0x187/0x420 [ 1284.625340][T26705] alloc_uevent_skb+0x5b/0x120 [ 1284.630097][T26705] kobject_uevent_env+0x863/0xc40 [ 1284.635114][T26705] disk_force_media_change+0xe3/0x170 [ 1284.640500][T26705] loop_configure+0x6c0/0xeb0 [ 1284.645231][T26705] lo_ioctl+0x618/0x13e0 [ 1284.649491][T26705] ? path_openat+0x18d4/0x1ec0 [ 1284.654256][T26705] ? blkdev_common_ioctl+0x438/0x1110 [ 1284.659620][T26705] ? selinux_file_ioctl+0x981/0xa10 [ 1284.664810][T26705] ? lo_release+0x120/0x120 [ 1284.669357][T26705] blkdev_ioctl+0x1d0/0x3f0 [ 1284.673889][T26705] block_ioctl+0x6e/0x80 [ 1284.678129][T26705] ? blkdev_iopoll+0x80/0x80 [ 1284.682734][T26705] __se_sys_ioctl+0xcb/0x140 [ 1284.687321][T26705] __x64_sys_ioctl+0x3f/0x50 [ 1284.692861][T26705] do_syscall_64+0x44/0xa0 [ 1284.697293][T26705] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1284.703250][T26705] RIP: 0033:0x4663b7 [ 1284.707229][T26705] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.726837][T26705] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1284.735245][T26705] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1284.743815][T26705] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1284.751899][T26705] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1284.759858][T26705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1284.767870][T26705] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1284.786282][T26708] loop3: detected capacity change from 0 to 264192 [ 1284.792965][T26709] FAULT_INJECTION: forcing a failure. [ 1284.792965][T26709] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.805634][T26709] CPU: 1 PID: 26709 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1284.807626][T26705] loop5: detected capacity change from 0 to 264192 [ 1284.814529][T26709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.814548][T26709] Call Trace: [ 1284.814555][T26709] dump_stack_lvl+0xd6/0x122 [ 1284.839065][T26709] dump_stack+0x11/0x1b [ 1284.843232][T26709] should_fail+0x23c/0x250 [ 1284.847645][T26709] ? __kernfs_new_node+0x6a/0x330 [ 1284.852702][T26709] __should_failslab+0x81/0x90 [ 1284.857527][T26709] should_failslab+0x5/0x20 [ 1284.862079][T26709] kmem_cache_alloc+0x4f/0x300 [ 1284.866934][T26709] __kernfs_new_node+0x6a/0x330 [ 1284.871847][T26709] ? __down_write_common+0x42/0x830 [ 1284.877046][T26709] ? idr_alloc_cyclic+0x26b/0x2f0 [ 1284.882087][T26709] ? __down_write_common+0x42/0x830 [ 1284.887294][T26709] ? rb_insert_color+0x7e/0x310 [ 1284.892164][T26709] kernfs_new_node+0x5b/0xd0 [ 1284.896771][T26709] __kernfs_create_file+0x45/0x1a0 [ 1284.901967][T26709] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1284.907348][T26709] internal_create_group+0x2f4/0x860 [ 1284.908712][T26705] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1284.912745][T26709] ? set_disk_ro+0x73/0x110 [ 1284.912770][T26709] sysfs_create_group+0x1b/0x20 [ 1284.928073][T26705] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1284.930220][T26709] loop_configure+0xbcd/0xeb0 [ 1284.930251][T26709] lo_ioctl+0x618/0x13e0 [ 1284.935597][T26705] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1284.944163][T26709] ? path_openat+0x18d4/0x1ec0 [ 1284.944195][T26709] ? blkdev_common_ioctl+0x438/0x1110 [ 1284.962481][T26702] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block 08:58:57 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1284.963736][T26709] ? selinux_file_ioctl+0x981/0xa10 [ 1284.963766][T26709] ? lo_release+0x120/0x120 [ 1284.968540][T26702] EXT4-fs (loop2): get root inode failed [ 1284.973853][T26709] blkdev_ioctl+0x1d0/0x3f0 [ 1284.985311][T26702] EXT4-fs (loop2): mount failed [ 1284.990473][T26709] block_ioctl+0x6e/0x80 [ 1285.014238][T26709] ? blkdev_iopoll+0x80/0x80 [ 1285.018821][T26709] __se_sys_ioctl+0xcb/0x140 [ 1285.023406][T26709] __x64_sys_ioctl+0x3f/0x50 [ 1285.028030][T26709] do_syscall_64+0x44/0xa0 [ 1285.032431][T26709] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1285.038492][T26709] RIP: 0033:0x4663b7 [ 1285.042697][T26709] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.062300][T26709] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1285.070759][T26709] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1285.078956][T26709] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:58:57 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1285.087160][T26709] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1285.095217][T26709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1285.103172][T26709] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1285.113397][T26709] loop0: detected capacity change from 0 to 264192 08:58:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000012, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1285.138351][T26709] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature 08:58:57 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1285.182792][T26709] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1285.220274][T26709] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000110, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:57 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1285.221604][T26742] FAULT_INJECTION: forcing a failure. [ 1285.221604][T26742] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.243772][T26742] CPU: 1 PID: 26742 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1285.252557][T26742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.262612][T26742] Call Trace: [ 1285.265883][T26742] dump_stack_lvl+0xd6/0x122 [ 1285.270474][T26742] dump_stack+0x11/0x1b [ 1285.274697][T26742] should_fail+0x23c/0x250 [ 1285.279163][T26742] ? skb_clone+0x12c/0x1f0 [ 1285.283580][T26742] __should_failslab+0x81/0x90 [ 1285.288326][T26742] should_failslab+0x5/0x20 [ 1285.292817][T26742] kmem_cache_alloc+0x4f/0x300 [ 1285.297564][T26742] skb_clone+0x12c/0x1f0 [ 1285.301922][T26742] netlink_broadcast_filtered+0x4fd/0xb60 [ 1285.307626][T26742] ? skb_put+0xb9/0xf0 [ 1285.311723][T26742] netlink_broadcast+0x35/0x50 [ 1285.316478][T26742] kobject_uevent_env+0x8c9/0xc40 [ 1285.321490][T26742] disk_force_media_change+0xe3/0x170 [ 1285.326875][T26742] loop_configure+0x6c0/0xeb0 [ 1285.331549][T26742] lo_ioctl+0x618/0x13e0 [ 1285.335808][T26742] ? path_openat+0x18d4/0x1ec0 [ 1285.340557][T26742] ? blkdev_common_ioctl+0x438/0x1110 [ 1285.345997][T26742] ? selinux_file_ioctl+0x981/0xa10 [ 1285.351229][T26742] ? lo_release+0x120/0x120 [ 1285.355754][T26742] blkdev_ioctl+0x1d0/0x3f0 [ 1285.360247][T26742] block_ioctl+0x6e/0x80 [ 1285.364467][T26742] ? blkdev_iopoll+0x80/0x80 [ 1285.369033][T26742] __se_sys_ioctl+0xcb/0x140 [ 1285.373621][T26742] __x64_sys_ioctl+0x3f/0x50 [ 1285.378245][T26742] do_syscall_64+0x44/0xa0 [ 1285.382646][T26742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1285.388625][T26742] RIP: 0033:0x4663b7 [ 1285.392506][T26742] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.412318][T26742] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1285.420723][T26742] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1285.428683][T26742] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1285.436682][T26742] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1285.444674][T26742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1285.452640][T26742] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1285.461023][T26742] loop5: detected capacity change from 0 to 264192 [ 1285.465914][T26745] loop3: detected capacity change from 0 to 264192 [ 1285.474764][T26749] loop2: detected capacity change from 0 to 264192 [ 1285.489775][T26745] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1285.503182][T26742] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1285.509043][T26745] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1285.520573][T26742] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1285.562894][T26745] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1285.577954][T26742] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1285.605606][T26772] FAULT_INJECTION: forcing a failure. [ 1285.605606][T26772] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.618355][T26772] CPU: 1 PID: 26772 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1285.627112][T26772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.637178][T26772] Call Trace: [ 1285.640454][T26772] dump_stack_lvl+0xd6/0x122 [ 1285.645199][T26772] dump_stack+0x11/0x1b [ 1285.649429][T26772] should_fail+0x23c/0x250 [ 1285.653863][T26772] ? __kernfs_new_node+0x6a/0x330 [ 1285.658904][T26772] __should_failslab+0x81/0x90 [ 1285.663742][T26772] should_failslab+0x5/0x20 [ 1285.668230][T26772] kmem_cache_alloc+0x4f/0x300 [ 1285.672975][T26772] ? __down_write_common+0x42/0x830 [ 1285.678170][T26772] __kernfs_new_node+0x6a/0x330 [ 1285.683061][T26772] ? up_write+0x25/0xc0 [ 1285.687236][T26772] kernfs_new_node+0x5b/0xd0 [ 1285.691816][T26772] __kernfs_create_file+0x45/0x1a0 [ 1285.696907][T26772] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1285.702309][T26772] internal_create_group+0x2f4/0x860 [ 1285.707585][T26772] ? set_disk_ro+0x73/0x110 [ 1285.712069][T26772] sysfs_create_group+0x1b/0x20 [ 1285.716961][T26772] loop_configure+0xbcd/0xeb0 [ 1285.721632][T26772] lo_ioctl+0x618/0x13e0 [ 1285.725899][T26772] ? path_openat+0x18d4/0x1ec0 [ 1285.730756][T26772] ? blkdev_common_ioctl+0x438/0x1110 [ 1285.736134][T26772] ? selinux_file_ioctl+0x981/0xa10 [ 1285.741322][T26772] ? lo_release+0x120/0x120 [ 1285.745811][T26772] blkdev_ioctl+0x1d0/0x3f0 [ 1285.750413][T26772] block_ioctl+0x6e/0x80 [ 1285.754640][T26772] ? blkdev_iopoll+0x80/0x80 [ 1285.759213][T26772] __se_sys_ioctl+0xcb/0x140 [ 1285.763786][T26772] __x64_sys_ioctl+0x3f/0x50 [ 1285.768359][T26772] do_syscall_64+0x44/0xa0 [ 1285.772755][T26772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1285.778709][T26772] RIP: 0033:0x4663b7 [ 1285.782636][T26772] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.802488][T26772] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1285.811060][T26772] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1285.819028][T26772] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1285.826985][T26772] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1285.835025][T26772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1285.842994][T26772] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1285.851093][T26772] loop0: detected capacity change from 0 to 264192 [ 1285.862223][T26772] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1285.887475][T26772] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1285.903074][T26772] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:58:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:58:59 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:58:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000032, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001001, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:59 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:58:59 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1287.576844][T26800] FAULT_INJECTION: forcing a failure. [ 1287.576844][T26800] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.578058][T26801] loop2: detected capacity change from 0 to 264192 [ 1287.589624][T26800] CPU: 0 PID: 26800 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1287.604868][T26800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.615068][T26800] Call Trace: [ 1287.618468][T26800] dump_stack_lvl+0xd6/0x122 [ 1287.623126][T26800] dump_stack+0x11/0x1b [ 1287.627281][T26800] should_fail+0x23c/0x250 [ 1287.631729][T26800] ? __kernfs_new_node+0x6a/0x330 [ 1287.636787][T26800] __should_failslab+0x81/0x90 [ 1287.641551][T26800] should_failslab+0x5/0x20 [ 1287.646096][T26800] kmem_cache_alloc+0x4f/0x300 [ 1287.651019][T26800] __kernfs_new_node+0x6a/0x330 [ 1287.655863][T26800] ? __down_write_common+0x42/0x830 [ 1287.661218][T26800] ? idr_alloc_cyclic+0x26b/0x2f0 [ 1287.666233][T26800] ? __down_write_common+0x42/0x830 [ 1287.671418][T26800] ? rb_insert_color+0x7e/0x310 [ 1287.676256][T26800] kernfs_new_node+0x5b/0xd0 [ 1287.680851][T26800] __kernfs_create_file+0x45/0x1a0 [ 1287.685947][T26800] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1287.691305][T26800] internal_create_group+0x2f4/0x860 [ 1287.696599][T26800] ? set_disk_ro+0x73/0x110 [ 1287.701090][T26800] sysfs_create_group+0x1b/0x20 [ 1287.705938][T26800] loop_configure+0xbcd/0xeb0 [ 1287.711476][T26800] lo_ioctl+0x618/0x13e0 [ 1287.716147][T26800] ? path_openat+0x18d4/0x1ec0 [ 1287.720918][T26800] ? blkdev_common_ioctl+0x438/0x1110 [ 1287.726274][T26800] ? selinux_file_ioctl+0x981/0xa10 [ 1287.731536][T26800] ? lo_release+0x120/0x120 [ 1287.736050][T26800] blkdev_ioctl+0x1d0/0x3f0 [ 1287.740541][T26800] block_ioctl+0x6e/0x80 [ 1287.744772][T26800] ? blkdev_iopoll+0x80/0x80 [ 1287.749347][T26800] __se_sys_ioctl+0xcb/0x140 [ 1287.753925][T26800] __x64_sys_ioctl+0x3f/0x50 [ 1287.758502][T26800] do_syscall_64+0x44/0xa0 [ 1287.762914][T26800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1287.768800][T26800] RIP: 0033:0x4663b7 [ 1287.772678][T26800] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1287.792272][T26800] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1287.800669][T26800] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1287.808645][T26800] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1287.816602][T26800] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1287.824560][T26800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1287.832522][T26800] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1287.848716][T26809] loop3: detected capacity change from 0 to 264192 [ 1287.854653][T26810] FAULT_INJECTION: forcing a failure. [ 1287.854653][T26810] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.867851][T26810] CPU: 1 PID: 26810 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 08:59:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1287.867908][T26800] loop0: detected capacity change from 0 to 264192 [ 1287.876609][T26810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.876621][T26810] Call Trace: [ 1287.876628][T26810] dump_stack_lvl+0xd6/0x122 [ 1287.901013][T26810] dump_stack+0x11/0x1b [ 1287.905172][T26810] should_fail+0x23c/0x250 [ 1287.909590][T26810] __should_failslab+0x81/0x90 [ 1287.914504][T26810] ? call_usermodehelper_setup+0x71/0x190 [ 1287.920321][T26810] should_failslab+0x5/0x20 [ 1287.924872][T26810] kmem_cache_alloc_trace+0x52/0x320 [ 1287.930155][T26810] call_usermodehelper_setup+0x71/0x190 [ 1287.935731][T26810] ? add_uevent_var+0x1d0/0x1d0 [ 1287.940588][T26810] kobject_uevent_env+0xb29/0xc40 [ 1287.945651][T26810] disk_force_media_change+0xe3/0x170 [ 1287.951071][T26810] loop_configure+0x6c0/0xeb0 [ 1287.955762][T26810] lo_ioctl+0x618/0x13e0 [ 1287.960055][T26810] ? path_openat+0x18d4/0x1ec0 [ 1287.964820][T26810] ? blkdev_common_ioctl+0x438/0x1110 [ 1287.965334][T26809] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1287.970182][T26810] ? selinux_file_ioctl+0x981/0xa10 [ 1287.970210][T26810] ? lo_release+0x120/0x120 [ 1287.983579][T26801] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1287.988259][T26810] blkdev_ioctl+0x1d0/0x3f0 [ 1287.992784][T26801] EXT4-fs (loop2): get root inode failed [ 1288.004188][T26810] block_ioctl+0x6e/0x80 [ 1288.008686][T26801] EXT4-fs (loop2): mount failed [ 1288.014284][T26810] ? blkdev_iopoll+0x80/0x80 [ 1288.014301][T26810] __se_sys_ioctl+0xcb/0x140 [ 1288.014320][T26810] __x64_sys_ioctl+0x3f/0x50 [ 1288.023549][T26809] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1288.027934][T26810] do_syscall_64+0x44/0xa0 [ 1288.027964][T26810] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1288.034441][T26809] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1288.037160][T26810] RIP: 0033:0x4663b7 08:59:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140000fe, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1288.037177][T26810] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1288.037196][T26810] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 [ 1288.047251][T26800] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1288.050687][T26810] ORIG_RAX: 0000000000000010 [ 1288.050697][T26810] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1288.050710][T26810] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1288.050723][T26810] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1288.050735][T26810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1288.058640][T26800] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1288.067090][T26810] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1288.093747][T26810] loop5: detected capacity change from 0 to 264192 08:59:00 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1288.121412][T26800] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1288.167432][T26810] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1288.209960][T26810] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 08:59:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001402, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1288.220506][T26810] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:00 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1288.253451][T26839] loop3: detected capacity change from 0 to 264192 [ 1288.272562][T26847] loop2: detected capacity change from 0 to 264192 [ 1288.287493][T26849] FAULT_INJECTION: forcing a failure. [ 1288.287493][T26849] name failslab, interval 1, probability 0, space 0, times 0 08:59:00 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1288.300216][T26849] CPU: 0 PID: 26849 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1288.307056][T26839] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1288.308974][T26849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.308988][T26849] Call Trace: [ 1288.308995][T26849] dump_stack_lvl+0xd6/0x122 [ 1288.309020][T26849] dump_stack+0x11/0x1b [ 1288.343926][T26849] should_fail+0x23c/0x250 [ 1288.348346][T26849] ? __kernfs_new_node+0x6a/0x330 [ 1288.353459][T26849] __should_failslab+0x81/0x90 [ 1288.357056][T26839] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1288.358282][T26849] should_failslab+0x5/0x20 [ 1288.358307][T26849] kmem_cache_alloc+0x4f/0x300 [ 1288.376820][T26849] ? __down_write_common+0x42/0x830 [ 1288.382089][T26849] __kernfs_new_node+0x6a/0x330 [ 1288.386954][T26849] ? up_write+0x25/0xc0 [ 1288.391112][T26849] kernfs_new_node+0x5b/0xd0 [ 1288.395705][T26849] __kernfs_create_file+0x45/0x1a0 [ 1288.401002][T26849] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1288.406376][T26849] internal_create_group+0x2f4/0x860 [ 1288.411673][T26849] ? set_disk_ro+0x73/0x110 [ 1288.416263][T26849] sysfs_create_group+0x1b/0x20 [ 1288.421422][T26849] loop_configure+0xbcd/0xeb0 [ 1288.424061][T26847] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1288.426104][T26849] lo_ioctl+0x618/0x13e0 [ 1288.437641][T26847] EXT4-fs (loop2): get root inode failed [ 1288.442246][T26849] ? path_openat+0x18d4/0x1ec0 [ 1288.447895][T26847] EXT4-fs (loop2): mount failed [ 1288.452696][T26849] ? blkdev_common_ioctl+0x438/0x1110 [ 1288.462255][T26839] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1288.462867][T26849] ? selinux_file_ioctl+0x981/0xa10 [ 1288.462893][T26849] ? lo_release+0x120/0x120 [ 1288.483037][T26849] blkdev_ioctl+0x1d0/0x3f0 [ 1288.487626][T26849] block_ioctl+0x6e/0x80 [ 1288.491905][T26849] ? blkdev_iopoll+0x80/0x80 [ 1288.496504][T26849] __se_sys_ioctl+0xcb/0x140 08:59:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1288.501099][T26849] __x64_sys_ioctl+0x3f/0x50 [ 1288.505784][T26849] do_syscall_64+0x44/0xa0 [ 1288.510281][T26849] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1288.516182][T26849] RIP: 0033:0x4663b7 [ 1288.520179][T26849] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1288.540350][T26849] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1288.548745][T26849] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1288.556700][T26849] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1288.564698][T26849] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1288.572656][T26849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1288.580707][T26849] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1288.591502][T26849] loop0: detected capacity change from 0 to 264192 08:59:01 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1288.605023][T26849] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1288.618592][T26849] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 08:59:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001502, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:01 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1288.654876][T26849] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1288.667607][T26877] loop3: detected capacity change from 0 to 264192 [ 1288.683469][T26877] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1288.699609][T26882] FAULT_INJECTION: forcing a failure. [ 1288.699609][T26882] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.701720][T26877] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1288.712272][T26882] CPU: 1 PID: 26882 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1288.730122][T26882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.740354][T26882] Call Trace: [ 1288.743661][T26882] dump_stack_lvl+0xd6/0x122 [ 1288.748367][T26882] dump_stack+0x11/0x1b [ 1288.752533][T26882] should_fail+0x23c/0x250 [ 1288.757398][T26882] ? __kernfs_new_node+0x6a/0x330 [ 1288.762552][T26882] __should_failslab+0x81/0x90 [ 1288.767399][T26882] should_failslab+0x5/0x20 [ 1288.771893][T26882] kmem_cache_alloc+0x4f/0x300 [ 1288.776648][T26882] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 1288.782453][T26882] __kernfs_new_node+0x6a/0x330 [ 1288.787378][T26882] ? ___cache_free+0x3c/0x300 [ 1288.792142][T26882] ? kfree+0xf8/0x1d0 [ 1288.796186][T26882] kernfs_create_dir_ns+0x5e/0x140 [ 1288.801294][T26882] internal_create_group+0x148/0x860 [ 1288.807158][T26882] ? __invalidate_device+0xb0/0xc0 [ 1288.812285][T26882] ? set_disk_ro+0x73/0x110 [ 1288.816777][T26882] sysfs_create_group+0x1b/0x20 [ 1288.821619][T26882] loop_configure+0xbcd/0xeb0 [ 1288.826379][T26882] lo_ioctl+0x618/0x13e0 [ 1288.830776][T26882] ? path_openat+0x18d4/0x1ec0 [ 1288.835637][T26882] ? blkdev_common_ioctl+0x438/0x1110 [ 1288.841008][T26882] ? selinux_file_ioctl+0x981/0xa10 [ 1288.846225][T26882] ? lo_release+0x120/0x120 [ 1288.851159][T26882] blkdev_ioctl+0x1d0/0x3f0 [ 1288.855675][T26882] block_ioctl+0x6e/0x80 [ 1288.859958][T26882] ? blkdev_iopoll+0x80/0x80 [ 1288.864538][T26882] __se_sys_ioctl+0xcb/0x140 [ 1288.869118][T26882] __x64_sys_ioctl+0x3f/0x50 [ 1288.873705][T26882] do_syscall_64+0x44/0xa0 [ 1288.878214][T26882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1288.884154][T26882] RIP: 0033:0x4663b7 [ 1288.888077][T26882] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1288.908195][T26882] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1288.916599][T26882] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1288.924623][T26882] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1288.932596][T26882] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1288.940556][T26882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1288.948520][T26882] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1288.956998][T26882] loop5: detected capacity change from 0 to 264192 [ 1288.970659][T26877] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1288.981374][T26887] loop2: detected capacity change from 0 to 264192 [ 1288.984622][T26882] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1289.002125][T26882] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1289.018141][T26882] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1289.031010][T26887] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1289.042567][T26887] EXT4-fs (loop2): get root inode failed [ 1289.048234][T26887] EXT4-fs (loop2): mount failed 08:59:01 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000104, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1289.106417][T26899] FAULT_INJECTION: forcing a failure. [ 1289.106417][T26899] name failslab, interval 1, probability 0, space 0, times 0 [ 1289.119068][T26899] CPU: 0 PID: 26899 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1289.127827][T26899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.137878][T26899] Call Trace: [ 1289.141166][T26899] dump_stack_lvl+0xd6/0x122 [ 1289.145780][T26899] dump_stack+0x11/0x1b [ 1289.150010][T26899] should_fail+0x23c/0x250 [ 1289.154651][T26899] ? __kernfs_new_node+0x6a/0x330 [ 1289.159691][T26899] __should_failslab+0x81/0x90 [ 1289.164519][T26899] should_failslab+0x5/0x20 [ 1289.169093][T26899] kmem_cache_alloc+0x4f/0x300 [ 1289.173887][T26899] ? __down_write_common+0x42/0x830 [ 1289.179089][T26899] __kernfs_new_node+0x6a/0x330 [ 1289.183987][T26899] ? up_write+0x25/0xc0 [ 1289.188128][T26899] kernfs_new_node+0x5b/0xd0 [ 1289.192713][T26899] __kernfs_create_file+0x45/0x1a0 [ 1289.197814][T26899] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1289.203295][T26899] internal_create_group+0x2f4/0x860 [ 1289.208572][T26899] ? set_disk_ro+0x73/0x110 [ 1289.213068][T26899] sysfs_create_group+0x1b/0x20 [ 1289.217917][T26899] loop_configure+0xbcd/0xeb0 [ 1289.222613][T26899] lo_ioctl+0x618/0x13e0 [ 1289.226911][T26899] ? path_openat+0x18d4/0x1ec0 [ 1289.231683][T26899] ? finish_task_switch+0xce/0x290 [ 1289.236798][T26899] ? blkdev_common_ioctl+0x438/0x1110 [ 1289.242337][T26899] ? selinux_file_ioctl+0x981/0xa10 [ 1289.247577][T26899] ? lo_release+0x120/0x120 [ 1289.252075][T26899] blkdev_ioctl+0x1d0/0x3f0 [ 1289.256586][T26899] block_ioctl+0x6e/0x80 [ 1289.260838][T26899] ? blkdev_iopoll+0x80/0x80 [ 1289.265499][T26899] __se_sys_ioctl+0xcb/0x140 [ 1289.270089][T26899] __x64_sys_ioctl+0x3f/0x50 [ 1289.274805][T26899] do_syscall_64+0x44/0xa0 [ 1289.279291][T26899] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1289.285433][T26899] RIP: 0033:0x4663b7 [ 1289.289394][T26899] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1289.308994][T26899] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1289.317445][T26899] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1289.325491][T26899] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1289.333452][T26899] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1289.341414][T26899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1289.349443][T26899] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1289.386355][T26899] loop0: detected capacity change from 0 to 264192 [ 1289.411894][T26899] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1289.424142][T26916] loop3: detected capacity change from 0 to 264192 [ 1289.435538][T26899] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1289.451234][T26916] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1289.465185][T26899] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1289.472983][T26916] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1289.490390][T26916] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:03 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001602, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:03 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000110, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1290.945224][T26939] FAULT_INJECTION: forcing a failure. [ 1290.945224][T26939] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.957989][T26939] CPU: 0 PID: 26939 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1290.959022][T26942] FAULT_INJECTION: forcing a failure. [ 1290.959022][T26942] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.966750][T26939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.966795][T26939] Call Trace: [ 1290.966803][T26939] dump_stack_lvl+0xd6/0x122 [ 1290.997506][T26939] dump_stack+0x11/0x1b [ 1291.001660][T26939] should_fail+0x23c/0x250 [ 1291.006066][T26939] ? __kernfs_new_node+0x6a/0x330 [ 1291.011101][T26939] __should_failslab+0x81/0x90 [ 1291.015877][T26939] should_failslab+0x5/0x20 [ 1291.020400][T26939] kmem_cache_alloc+0x4f/0x300 [ 1291.025247][T26939] ? __down_write_common+0x42/0x830 [ 1291.030625][T26939] __kernfs_new_node+0x6a/0x330 [ 1291.035473][T26939] ? up_write+0x25/0xc0 [ 1291.039614][T26939] kernfs_new_node+0x5b/0xd0 [ 1291.044217][T26939] __kernfs_create_file+0x45/0x1a0 [ 1291.049324][T26939] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1291.054991][T26939] internal_create_group+0x2f4/0x860 [ 1291.060266][T26939] ? set_disk_ro+0x73/0x110 [ 1291.064770][T26939] sysfs_create_group+0x1b/0x20 [ 1291.069622][T26939] loop_configure+0xbcd/0xeb0 [ 1291.074299][T26939] lo_ioctl+0x618/0x13e0 [ 1291.078536][T26939] ? path_openat+0x18d4/0x1ec0 [ 1291.083296][T26939] ? blkdev_common_ioctl+0x438/0x1110 [ 1291.088682][T26939] ? selinux_file_ioctl+0x981/0xa10 [ 1291.093894][T26939] ? lo_release+0x120/0x120 [ 1291.098413][T26939] blkdev_ioctl+0x1d0/0x3f0 [ 1291.102930][T26939] block_ioctl+0x6e/0x80 [ 1291.107181][T26939] ? blkdev_iopoll+0x80/0x80 [ 1291.111844][T26939] __se_sys_ioctl+0xcb/0x140 [ 1291.116435][T26939] __x64_sys_ioctl+0x3f/0x50 [ 1291.121104][T26939] do_syscall_64+0x44/0xa0 [ 1291.125517][T26939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1291.131417][T26939] RIP: 0033:0x4663b7 [ 1291.135300][T26939] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1291.155166][T26939] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1291.163579][T26939] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1291.171567][T26939] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1291.179582][T26939] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1291.187554][T26939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1291.195511][T26939] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1291.203687][T26942] CPU: 1 PID: 26942 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1291.212264][T26939] loop0: detected capacity change from 0 to 264192 [ 1291.212653][T26942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.212666][T26942] Call Trace: [ 1291.212673][T26942] dump_stack_lvl+0xd6/0x122 [ 1291.237405][T26942] dump_stack+0x11/0x1b [ 1291.241566][T26942] should_fail+0x23c/0x250 [ 1291.245985][T26942] ? __kernfs_new_node+0x6a/0x330 [ 1291.251236][T26942] __should_failslab+0x81/0x90 [ 1291.255990][T26942] should_failslab+0x5/0x20 [ 1291.260571][T26942] kmem_cache_alloc+0x4f/0x300 [ 1291.265618][T26942] __kernfs_new_node+0x6a/0x330 [ 1291.270495][T26942] ? __down_write_common+0x42/0x830 [ 1291.275683][T26942] ? idr_alloc_cyclic+0x26b/0x2f0 [ 1291.280836][T26942] ? __down_write_common+0x42/0x830 [ 1291.286045][T26942] ? rb_insert_color+0x7e/0x310 [ 1291.290883][T26942] kernfs_new_node+0x5b/0xd0 [ 1291.295471][T26942] __kernfs_create_file+0x45/0x1a0 [ 1291.300570][T26942] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1291.305998][T26942] internal_create_group+0x2f4/0x860 [ 1291.311275][T26942] ? set_disk_ro+0x73/0x110 [ 1291.315821][T26942] sysfs_create_group+0x1b/0x20 [ 1291.320684][T26942] loop_configure+0xbcd/0xeb0 [ 1291.325398][T26942] lo_ioctl+0x618/0x13e0 [ 1291.329631][T26942] ? path_openat+0x18d4/0x1ec0 [ 1291.334416][T26942] ? blkdev_common_ioctl+0x438/0x1110 [ 1291.339847][T26942] ? selinux_file_ioctl+0x981/0xa10 [ 1291.345038][T26942] ? lo_release+0x120/0x120 [ 1291.349534][T26942] blkdev_ioctl+0x1d0/0x3f0 [ 1291.354082][T26942] block_ioctl+0x6e/0x80 [ 1291.358310][T26942] ? blkdev_iopoll+0x80/0x80 [ 1291.362886][T26942] __se_sys_ioctl+0xcb/0x140 [ 1291.367482][T26942] __x64_sys_ioctl+0x3f/0x50 [ 1291.372060][T26942] do_syscall_64+0x44/0xa0 [ 1291.376471][T26942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1291.382375][T26942] RIP: 0033:0x4663b7 [ 1291.386258][T26942] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1291.405853][T26942] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1291.415361][T26942] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1291.423348][T26942] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1291.432498][T26942] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1291.440465][T26942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1291.448426][T26942] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1291.459696][T26942] loop5: detected capacity change from 0 to 264192 [ 1291.464621][T26939] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1291.479363][T26939] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1291.481070][T26943] loop3: detected capacity change from 0 to 264192 08:59:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1291.495925][T26939] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1291.508714][T26944] loop2: detected capacity change from 0 to 264192 [ 1291.515530][T26942] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature 08:59:03 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1291.553010][T26943] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1291.583396][T26942] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1291.586931][T26943] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1291.603493][T26942] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1291.635712][T26944] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1291.647348][T26944] EXT4-fs (loop2): get root inode failed 08:59:04 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000402, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:04 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1291.652979][T26944] EXT4-fs (loop2): mount failed [ 1291.653444][T26943] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1291.731101][T26983] FAULT_INJECTION: forcing a failure. [ 1291.731101][T26983] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.736812][T26973] loop0: detected capacity change from 0 to 264192 [ 1291.743774][T26983] CPU: 1 PID: 26983 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1291.753398][T26973] FAULT_INJECTION: forcing a failure. [ 1291.753398][T26973] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.759050][T26983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.759062][T26983] Call Trace: [ 1291.759069][T26983] dump_stack_lvl+0xd6/0x122 [ 1291.789510][T26983] dump_stack+0x11/0x1b [ 1291.793700][T26983] should_fail+0x23c/0x250 [ 1291.798108][T26983] ? __kernfs_new_node+0x6a/0x330 [ 1291.803151][T26983] __should_failslab+0x81/0x90 [ 1291.807901][T26983] should_failslab+0x5/0x20 [ 1291.812396][T26983] kmem_cache_alloc+0x4f/0x300 [ 1291.817147][T26983] __kernfs_new_node+0x6a/0x330 [ 1291.821989][T26983] ? __down_write_common+0x42/0x830 [ 1291.827187][T26983] ? idr_alloc_cyclic+0x26b/0x2f0 [ 1291.832198][T26983] ? __down_write_common+0x42/0x830 [ 1291.837383][T26983] ? rb_insert_color+0x7e/0x310 [ 1291.842219][T26983] kernfs_new_node+0x5b/0xd0 [ 1291.846839][T26983] __kernfs_create_file+0x45/0x1a0 [ 1291.851948][T26983] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1291.857316][T26983] internal_create_group+0x2f4/0x860 [ 1291.862597][T26983] ? set_disk_ro+0x73/0x110 [ 1291.867096][T26983] sysfs_create_group+0x1b/0x20 [ 1291.871933][T26983] loop_configure+0xbcd/0xeb0 [ 1291.876603][T26983] lo_ioctl+0x618/0x13e0 [ 1291.880863][T26983] ? path_openat+0x18d4/0x1ec0 [ 1291.885713][T26983] ? blkdev_common_ioctl+0x438/0x1110 [ 1291.891146][T26983] ? selinux_file_ioctl+0x981/0xa10 [ 1291.896408][T26983] ? lo_release+0x120/0x120 [ 1291.900900][T26983] blkdev_ioctl+0x1d0/0x3f0 [ 1291.905403][T26983] block_ioctl+0x6e/0x80 [ 1291.909630][T26983] ? blkdev_iopoll+0x80/0x80 [ 1291.914211][T26983] __se_sys_ioctl+0xcb/0x140 [ 1291.918793][T26983] __x64_sys_ioctl+0x3f/0x50 [ 1291.923369][T26983] do_syscall_64+0x44/0xa0 [ 1291.927775][T26983] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1291.933707][T26983] RIP: 0033:0x4663b7 [ 1291.937593][T26983] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1291.957187][T26983] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1291.965586][T26983] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1291.973555][T26983] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:59:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001802, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1291.981614][T26983] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1291.990793][T26983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1291.998750][T26983] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1292.006714][T26973] CPU: 0 PID: 26973 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1292.015563][T26973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.025622][T26973] Call Trace: [ 1292.028900][T26973] dump_stack_lvl+0xd6/0x122 [ 1292.031976][T26983] loop5: detected capacity change from 0 to 264192 [ 1292.033494][T26973] dump_stack+0x11/0x1b [ 1292.033517][T26973] should_fail+0x23c/0x250 [ 1292.033535][T26973] __should_failslab+0x81/0x90 [ 1292.033554][T26973] ? kobject_uevent_env+0x1a7/0xc40 [ 1292.033577][T26973] should_failslab+0x5/0x20 [ 1292.063056][T26973] kmem_cache_alloc_trace+0x52/0x320 [ 1292.068346][T26973] ? dev_uevent_filter+0x70/0x70 [ 1292.073275][T26973] kobject_uevent_env+0x1a7/0xc40 [ 1292.078295][T26973] ? internal_create_group+0x7d9/0x860 [ 1292.083745][T26973] ? set_capacity_and_notify+0x1eb/0x200 [ 1292.089368][T26973] kobject_uevent+0x18/0x20 [ 1292.093884][T26973] loop_configure+0xce1/0xeb0 [ 1292.098605][T26973] lo_ioctl+0x618/0x13e0 [ 1292.102836][T26973] ? path_openat+0x18d4/0x1ec0 [ 1292.107667][T26973] ? blkdev_common_ioctl+0x438/0x1110 [ 1292.113028][T26973] ? selinux_file_ioctl+0x981/0xa10 [ 1292.118265][T26973] ? lo_release+0x120/0x120 [ 1292.122757][T26973] blkdev_ioctl+0x1d0/0x3f0 [ 1292.127319][T26973] block_ioctl+0x6e/0x80 [ 1292.131640][T26973] ? blkdev_iopoll+0x80/0x80 [ 1292.136217][T26973] __se_sys_ioctl+0xcb/0x140 [ 1292.140793][T26973] __x64_sys_ioctl+0x3f/0x50 [ 1292.145371][T26973] do_syscall_64+0x44/0xa0 [ 1292.149778][T26973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1292.155666][T26973] RIP: 0033:0x4663b7 [ 1292.159546][T26973] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.179137][T26973] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1292.187713][T26973] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1292.196008][T26973] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1292.204096][T26973] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1292.212064][T26973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1292.220061][T26973] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1292.255282][T26983] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1292.263389][T26973] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1292.274655][T26983] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1292.283006][T26994] loop3: detected capacity change from 0 to 264192 [ 1292.310144][T26999] loop2: detected capacity change from 0 to 264192 [ 1292.317653][T26983] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1292.349192][T26999] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1292.360755][T26999] EXT4-fs (loop2): get root inode failed [ 1292.366488][T26999] EXT4-fs (loop2): mount failed [ 1292.371681][T26973] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1292.381780][T26973] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1292.393434][T26994] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1292.423726][T26994] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1292.440251][T26994] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:06 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:06 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:06 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001902, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000502, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1293.953217][T27029] loop2: detected capacity change from 0 to 264192 [ 1293.960755][T27030] loop3: detected capacity change from 0 to 264192 [ 1293.976901][T27030] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1293.990508][T27029] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1294.002036][T27029] EXT4-fs (loop2): get root inode failed [ 1294.003188][T27041] loop0: detected capacity change from 0 to 264192 [ 1294.007711][T27029] EXT4-fs (loop2): mount failed [ 1294.029823][T27042] FAULT_INJECTION: forcing a failure. [ 1294.029823][T27042] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.042519][T27042] CPU: 1 PID: 27042 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1294.051286][T27042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.059714][T27030] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1294.061336][T27042] Call Trace: [ 1294.061345][T27042] dump_stack_lvl+0xd6/0x122 [ 1294.061369][T27042] dump_stack+0x11/0x1b [ 1294.070954][T27041] FAULT_INJECTION: forcing a failure. [ 1294.070954][T27041] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.073732][T27042] should_fail+0x23c/0x250 [ 1294.073759][T27042] ? __kernfs_new_node+0x6a/0x330 [ 1294.104374][T27042] __should_failslab+0x81/0x90 [ 1294.109276][T27042] should_failslab+0x5/0x20 [ 1294.113829][T27042] kmem_cache_alloc+0x4f/0x300 [ 1294.118603][T27042] ? __down_write_common+0x42/0x830 [ 1294.123799][T27042] __kernfs_new_node+0x6a/0x330 [ 1294.128646][T27042] ? up_write+0x25/0xc0 [ 1294.132798][T27042] kernfs_new_node+0x5b/0xd0 [ 1294.137431][T27042] __kernfs_create_file+0x45/0x1a0 [ 1294.142615][T27042] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1294.148017][T27042] internal_create_group+0x2f4/0x860 [ 1294.153361][T27042] ? set_disk_ro+0x73/0x110 [ 1294.158043][T27042] sysfs_create_group+0x1b/0x20 [ 1294.162883][T27042] loop_configure+0xbcd/0xeb0 [ 1294.167560][T27042] lo_ioctl+0x618/0x13e0 [ 1294.171799][T27042] ? path_openat+0x18d4/0x1ec0 [ 1294.176614][T27042] ? blkdev_common_ioctl+0x438/0x1110 [ 1294.181976][T27042] ? selinux_file_ioctl+0x981/0xa10 [ 1294.187245][T27042] ? lo_release+0x120/0x120 [ 1294.191736][T27042] blkdev_ioctl+0x1d0/0x3f0 [ 1294.196245][T27042] block_ioctl+0x6e/0x80 [ 1294.200510][T27042] ? blkdev_iopoll+0x80/0x80 [ 1294.205098][T27042] __se_sys_ioctl+0xcb/0x140 [ 1294.209678][T27042] __x64_sys_ioctl+0x3f/0x50 [ 1294.214273][T27042] do_syscall_64+0x44/0xa0 [ 1294.218765][T27042] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1294.224782][T27042] RIP: 0033:0x4663b7 [ 1294.228949][T27042] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.248761][T27042] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1294.257202][T27042] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1294.265265][T27042] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1294.273286][T27042] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1294.281245][T27042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1294.289296][T27042] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:59:06 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1294.297265][T27041] CPU: 0 PID: 27041 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1294.306031][T27041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.312672][T27042] loop5: detected capacity change from 0 to 264192 [ 1294.316343][T27041] Call Trace: [ 1294.316357][T27041] dump_stack_lvl+0xd6/0x122 [ 1294.316380][T27041] dump_stack+0x11/0x1b [ 1294.316397][T27041] should_fail+0x23c/0x250 [ 1294.323751][T27030] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1294.326148][T27041] ? kzalloc+0x1d/0x30 [ 1294.353954][T27041] __should_failslab+0x81/0x90 [ 1294.358777][T27041] should_failslab+0x5/0x20 [ 1294.363291][T27041] __kmalloc+0x6f/0x350 [ 1294.367450][T27041] kzalloc+0x1d/0x30 [ 1294.371391][T27041] kobject_get_path+0x7c/0x110 [ 1294.376195][T27041] kobject_uevent_env+0x1be/0xc40 [ 1294.381219][T27041] ? internal_create_group+0x7d9/0x860 [ 1294.386790][T27041] ? set_capacity_and_notify+0x1eb/0x200 [ 1294.392420][T27041] kobject_uevent+0x18/0x20 [ 1294.397031][T27041] loop_configure+0xce1/0xeb0 [ 1294.401711][T27041] lo_ioctl+0x618/0x13e0 [ 1294.406023][T27041] ? path_openat+0x18d4/0x1ec0 [ 1294.410866][T27041] ? blkdev_common_ioctl+0x438/0x1110 [ 1294.416255][T27041] ? selinux_file_ioctl+0x981/0xa10 [ 1294.421452][T27041] ? lo_release+0x120/0x120 [ 1294.425973][T27041] blkdev_ioctl+0x1d0/0x3f0 [ 1294.430478][T27041] block_ioctl+0x6e/0x80 [ 1294.434733][T27041] ? blkdev_iopoll+0x80/0x80 [ 1294.439319][T27041] __se_sys_ioctl+0xcb/0x140 [ 1294.443989][T27041] __x64_sys_ioctl+0x3f/0x50 [ 1294.448579][T27041] do_syscall_64+0x44/0xa0 [ 1294.453098][T27041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1294.459061][T27041] RIP: 0033:0x4663b7 [ 1294.463038][T27041] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.482737][T27041] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1294.491252][T27041] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1294.499218][T27041] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1294.507177][T27041] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1294.515148][T27041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1294.523110][T27041] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:59:07 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000602, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001a02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1294.545852][T27042] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1294.569601][T27042] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1294.580600][T27042] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:07 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1294.644161][T27041] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1294.659734][T27041] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1294.674741][T27069] loop2: detected capacity change from 0 to 264192 [ 1294.690347][T27041] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1294.693869][T27069] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1294.712401][T27069] EXT4-fs (loop2): get root inode failed [ 1294.718157][T27069] EXT4-fs (loop2): mount failed 08:59:07 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1294.752705][T27083] loop3: detected capacity change from 0 to 264192 [ 1294.763305][T27082] FAULT_INJECTION: forcing a failure. [ 1294.763305][T27082] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.775950][T27082] CPU: 1 PID: 27082 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1294.784711][T27082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.794793][T27082] Call Trace: [ 1294.798074][T27082] dump_stack_lvl+0xd6/0x122 [ 1294.802685][T27082] dump_stack+0x11/0x1b [ 1294.806841][T27082] should_fail+0x23c/0x250 [ 1294.811393][T27082] ? __kernfs_new_node+0x6a/0x330 [ 1294.816428][T27082] __should_failslab+0x81/0x90 [ 1294.821192][T27082] should_failslab+0x5/0x20 [ 1294.825693][T27082] kmem_cache_alloc+0x4f/0x300 [ 1294.830575][T27082] ? __down_write_common+0x42/0x830 [ 1294.835776][T27082] __kernfs_new_node+0x6a/0x330 [ 1294.840707][T27082] ? up_write+0x25/0xc0 [ 1294.844874][T27082] kernfs_new_node+0x5b/0xd0 [ 1294.849479][T27082] __kernfs_create_file+0x45/0x1a0 [ 1294.854681][T27082] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1294.860137][T27082] internal_create_group+0x2f4/0x860 [ 1294.866489][T27082] ? set_disk_ro+0x73/0x110 [ 1294.871002][T27082] sysfs_create_group+0x1b/0x20 [ 1294.875984][T27082] loop_configure+0xbcd/0xeb0 [ 1294.880089][T27083] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1294.880670][T27082] lo_ioctl+0x618/0x13e0 [ 1294.893750][T27083] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1294.897755][T27082] ? path_openat+0x18d4/0x1ec0 [ 1294.897794][T27082] ? blkdev_common_ioctl+0x438/0x1110 [ 1294.897822][T27082] ? selinux_file_ioctl+0x981/0xa10 [ 1294.911852][T27083] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1294.917052][T27082] ? lo_release+0x120/0x120 [ 1294.917080][T27082] blkdev_ioctl+0x1d0/0x3f0 [ 1294.917099][T27082] block_ioctl+0x6e/0x80 [ 1294.946089][T27082] ? blkdev_iopoll+0x80/0x80 [ 1294.950689][T27082] __se_sys_ioctl+0xcb/0x140 [ 1294.955266][T27082] __x64_sys_ioctl+0x3f/0x50 [ 1294.959835][T27082] do_syscall_64+0x44/0xa0 [ 1294.964245][T27082] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1294.970219][T27082] RIP: 0033:0x4663b7 [ 1294.974273][T27082] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.993957][T27082] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1295.002431][T27082] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1295.010400][T27082] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1295.018355][T27082] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1295.026304][T27082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1295.034253][T27082] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1295.044646][T27082] loop5: detected capacity change from 0 to 264192 [ 1295.054327][T27082] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1295.067825][T27082] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1295.077898][T27082] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1295.089050][T27095] loop0: detected capacity change from 0 to 264192 [ 1295.096600][T27095] FAULT_INJECTION: forcing a failure. [ 1295.096600][T27095] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.109314][T27095] CPU: 0 PID: 27095 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1295.118061][T27095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.128473][T27095] Call Trace: [ 1295.131732][T27095] dump_stack_lvl+0xd6/0x122 [ 1295.136303][T27095] dump_stack+0x11/0x1b [ 1295.140440][T27095] should_fail+0x23c/0x250 [ 1295.144836][T27095] __should_failslab+0x81/0x90 [ 1295.149729][T27095] should_failslab+0x5/0x20 [ 1295.154272][T27095] kmem_cache_alloc_node+0x61/0x2c0 [ 1295.159456][T27095] ? __alloc_skb+0xed/0x420 [ 1295.163993][T27095] __alloc_skb+0xed/0x420 [ 1295.168440][T27095] alloc_uevent_skb+0x5b/0x120 [ 1295.173282][T27095] kobject_uevent_env+0x863/0xc40 [ 1295.178295][T27095] ? internal_create_group+0x7d9/0x860 [ 1295.183802][T27095] ? set_capacity_and_notify+0x1eb/0x200 [ 1295.189416][T27095] kobject_uevent+0x18/0x20 [ 1295.193903][T27095] loop_configure+0xce1/0xeb0 [ 1295.198568][T27095] lo_ioctl+0x618/0x13e0 [ 1295.202800][T27095] ? path_openat+0x18d4/0x1ec0 [ 1295.207567][T27095] ? blkdev_common_ioctl+0x438/0x1110 [ 1295.212968][T27095] ? selinux_file_ioctl+0x981/0xa10 [ 1295.218153][T27095] ? lo_release+0x120/0x120 [ 1295.222766][T27095] blkdev_ioctl+0x1d0/0x3f0 [ 1295.227371][T27095] block_ioctl+0x6e/0x80 [ 1295.231601][T27095] ? blkdev_iopoll+0x80/0x80 [ 1295.236694][T27095] __se_sys_ioctl+0xcb/0x140 [ 1295.241270][T27095] __x64_sys_ioctl+0x3f/0x50 [ 1295.245839][T27095] do_syscall_64+0x44/0xa0 [ 1295.250246][T27095] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1295.256122][T27095] RIP: 0033:0x4663b7 [ 1295.260002][T27095] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1295.279589][T27095] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1295.288122][T27095] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1295.296089][T27095] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1295.304134][T27095] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1295.312437][T27095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1295.320390][T27095] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1295.350095][T27095] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1295.364076][T27095] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1295.375308][T27095] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f000007000001", 0x18}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:09 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001c02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000702, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:09 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:09 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1297.011320][T27125] loop2: detected capacity change from 0 to 264192 [ 1297.014295][T27127] loop0: detected capacity change from 0 to 264192 [ 1297.018593][T27126] loop3: detected capacity change from 0 to 264192 [ 1297.029405][T27128] FAULT_INJECTION: forcing a failure. [ 1297.029405][T27128] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.043652][T27128] CPU: 0 PID: 27128 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1297.052419][T27128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.062489][T27128] Call Trace: [ 1297.065763][T27128] dump_stack_lvl+0xd6/0x122 [ 1297.070365][T27128] dump_stack+0x11/0x1b [ 1297.074518][T27128] should_fail+0x23c/0x250 [ 1297.078925][T27128] ? __kernfs_new_node+0x6a/0x330 [ 1297.084204][T27128] __should_failslab+0x81/0x90 [ 1297.089261][T27128] should_failslab+0x5/0x20 [ 1297.093752][T27128] kmem_cache_alloc+0x4f/0x300 [ 1297.098506][T27128] ? __down_write_common+0x42/0x830 [ 1297.103694][T27128] __kernfs_new_node+0x6a/0x330 [ 1297.108536][T27128] ? up_write+0x25/0xc0 [ 1297.112678][T27128] kernfs_new_node+0x5b/0xd0 [ 1297.117611][T27128] __kernfs_create_file+0x45/0x1a0 [ 1297.122733][T27128] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1297.128091][T27128] internal_create_group+0x2f4/0x860 [ 1297.133391][T27128] ? set_disk_ro+0x73/0x110 [ 1297.137882][T27128] sysfs_create_group+0x1b/0x20 [ 1297.142729][T27128] loop_configure+0xbcd/0xeb0 [ 1297.147496][T27128] lo_ioctl+0x618/0x13e0 [ 1297.151738][T27128] ? path_openat+0x18d4/0x1ec0 [ 1297.156516][T27128] ? blkdev_common_ioctl+0x438/0x1110 [ 1297.161874][T27128] ? selinux_file_ioctl+0x981/0xa10 [ 1297.167092][T27128] ? lo_release+0x120/0x120 [ 1297.171593][T27128] blkdev_ioctl+0x1d0/0x3f0 [ 1297.176082][T27128] block_ioctl+0x6e/0x80 [ 1297.180310][T27128] ? blkdev_iopoll+0x80/0x80 [ 1297.184886][T27128] __se_sys_ioctl+0xcb/0x140 [ 1297.189557][T27128] __x64_sys_ioctl+0x3f/0x50 [ 1297.194158][T27128] do_syscall_64+0x44/0xa0 [ 1297.198678][T27128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1297.204621][T27128] RIP: 0033:0x4663b7 [ 1297.208571][T27128] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.228168][T27128] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1297.236606][T27128] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1297.244563][T27128] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1297.252516][T27128] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1297.260472][T27128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1297.268431][T27128] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1297.281326][T27125] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1297.289799][T27127] FAULT_INJECTION: forcing a failure. [ 1297.289799][T27127] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.292956][T27125] EXT4-fs (loop2): get root inode failed [ 1297.305465][T27127] CPU: 0 PID: 27127 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1297.305490][T27127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.311112][T27125] EXT4-fs (loop2): mount failed [ 1297.319830][T27127] Call Trace: [ 1297.319839][T27127] dump_stack_lvl+0xd6/0x122 [ 1297.338495][T27128] loop5: detected capacity change from 0 to 264192 [ 1297.342521][T27127] dump_stack+0x11/0x1b [ 1297.342547][T27127] should_fail+0x23c/0x250 [ 1297.357654][T27127] __should_failslab+0x81/0x90 08:59:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001d00, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1297.362419][T27127] should_failslab+0x5/0x20 [ 1297.366925][T27127] kmem_cache_alloc_node+0x61/0x2c0 [ 1297.372138][T27127] ? __alloc_skb+0xed/0x420 [ 1297.376726][T27127] __alloc_skb+0xed/0x420 [ 1297.381077][T27127] alloc_uevent_skb+0x5b/0x120 [ 1297.385929][T27127] kobject_uevent_env+0x863/0xc40 [ 1297.391060][T27127] ? internal_create_group+0x7d9/0x860 [ 1297.395754][T27126] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature 08:59:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001001, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1297.396554][T27127] ? set_capacity_and_notify+0x1eb/0x200 [ 1297.409640][T27126] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1297.415044][T27127] kobject_uevent+0x18/0x20 [ 1297.415073][T27127] loop_configure+0xce1/0xeb0 [ 1297.427260][T27126] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1297.428650][T27127] lo_ioctl+0x618/0x13e0 [ 1297.428677][T27127] ? path_openat+0x18d4/0x1ec0 [ 1297.452791][T27127] ? blkdev_common_ioctl+0x438/0x1110 [ 1297.458228][T27127] ? selinux_file_ioctl+0x981/0xa10 [ 1297.463445][T27127] ? lo_release+0x120/0x120 [ 1297.467933][T27127] blkdev_ioctl+0x1d0/0x3f0 [ 1297.472417][T27127] block_ioctl+0x6e/0x80 [ 1297.476697][T27127] ? blkdev_iopoll+0x80/0x80 [ 1297.481268][T27127] __se_sys_ioctl+0xcb/0x140 [ 1297.485853][T27127] __x64_sys_ioctl+0x3f/0x50 [ 1297.490427][T27127] do_syscall_64+0x44/0xa0 [ 1297.494858][T27127] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1297.500733][T27127] RIP: 0033:0x4663b7 [ 1297.504720][T27127] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.524313][T27127] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1297.532719][T27127] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1297.540695][T27127] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1297.548654][T27127] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1297.556679][T27127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1297.564849][T27127] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1297.592031][T27128] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1297.611276][T27127] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1297.643721][T27161] loop2: detected capacity change from 0 to 264192 [ 1297.654422][T27160] loop3: detected capacity change from 0 to 264192 08:59:10 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1297.664687][T27128] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1297.667291][T27127] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1297.674668][T27161] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1297.694611][T27161] EXT4-fs (loop2): get root inode failed [ 1297.700288][T27161] EXT4-fs (loop2): mount failed 08:59:10 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1297.707221][T27160] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1297.717511][T27127] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1297.722459][T27160] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1297.733748][T27128] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1297.752125][T27160] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:10 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001d02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1297.833173][T27183] loop0: detected capacity change from 0 to 264192 [ 1297.840777][T27183] FAULT_INJECTION: forcing a failure. [ 1297.840777][T27183] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.853701][T27183] CPU: 0 PID: 27183 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1297.862529][T27183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.872615][T27183] Call Trace: [ 1297.875883][T27183] dump_stack_lvl+0xd6/0x122 [ 1297.880522][T27183] dump_stack+0x11/0x1b [ 1297.884718][T27183] should_fail+0x23c/0x250 [ 1297.889187][T27183] ? skb_clone+0x12c/0x1f0 [ 1297.893655][T27183] __should_failslab+0x81/0x90 [ 1297.898466][T27183] should_failslab+0x5/0x20 [ 1297.903080][T27183] kmem_cache_alloc+0x4f/0x300 [ 1297.907832][T27183] skb_clone+0x12c/0x1f0 [ 1297.912121][T27183] netlink_broadcast_filtered+0x4fd/0xb60 [ 1297.917872][T27183] ? skb_put+0xb9/0xf0 [ 1297.922033][T27183] netlink_broadcast+0x35/0x50 [ 1297.926783][T27183] kobject_uevent_env+0x8c9/0xc40 [ 1297.931869][T27183] ? internal_create_group+0x7d9/0x860 [ 1297.937373][T27183] ? set_capacity_and_notify+0x1eb/0x200 [ 1297.943058][T27183] kobject_uevent+0x18/0x20 [ 1297.947596][T27183] loop_configure+0xce1/0xeb0 [ 1297.952273][T27183] lo_ioctl+0x618/0x13e0 [ 1297.956499][T27183] ? path_openat+0x18d4/0x1ec0 [ 1297.961267][T27183] ? blkdev_common_ioctl+0x438/0x1110 [ 1297.966626][T27183] ? selinux_file_ioctl+0x981/0xa10 [ 1297.971958][T27183] ? lo_release+0x120/0x120 [ 1297.976543][T27183] blkdev_ioctl+0x1d0/0x3f0 [ 1297.981272][T27183] block_ioctl+0x6e/0x80 [ 1297.985496][T27183] ? blkdev_iopoll+0x80/0x80 [ 1297.990152][T27183] __se_sys_ioctl+0xcb/0x140 [ 1297.994740][T27183] __x64_sys_ioctl+0x3f/0x50 [ 1297.999539][T27183] do_syscall_64+0x44/0xa0 [ 1298.004021][T27183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1298.009941][T27183] RIP: 0033:0x4663b7 [ 1298.013816][T27183] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.033495][T27183] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1298.041908][T27183] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1298.049861][T27183] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1298.057815][T27183] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1298.065877][T27183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1298.073838][T27183] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1298.083483][T27188] loop2: detected capacity change from 0 to 264192 [ 1298.090753][T27189] FAULT_INJECTION: forcing a failure. [ 1298.090753][T27189] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.103375][T27189] CPU: 0 PID: 27189 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1298.105538][T27183] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1298.112125][T27189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.112140][T27189] Call Trace: [ 1298.112147][T27189] dump_stack_lvl+0xd6/0x122 [ 1298.112171][T27189] dump_stack+0x11/0x1b [ 1298.112188][T27189] should_fail+0x23c/0x250 [ 1298.128848][T27183] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1298.135114][T27189] ? __kernfs_new_node+0x6a/0x330 [ 1298.138845][T27183] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1298.142971][T27189] __should_failslab+0x81/0x90 [ 1298.163000][T27188] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1298.165646][T27189] should_failslab+0x5/0x20 [ 1298.176170][T27188] EXT4-fs (loop2): get root inode failed [ 1298.180872][T27189] kmem_cache_alloc+0x4f/0x300 [ 1298.192326][T27188] EXT4-fs (loop2): mount failed [ 1298.196768][T27189] ? __down_write_common+0x42/0x830 [ 1298.217235][T27189] __kernfs_new_node+0x6a/0x330 [ 1298.222192][T27189] ? up_write+0x25/0xc0 [ 1298.226374][T27189] kernfs_new_node+0x5b/0xd0 [ 1298.231045][T27189] __kernfs_create_file+0x45/0x1a0 [ 1298.236178][T27189] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1298.241546][T27189] internal_create_group+0x2f4/0x860 [ 1298.246829][T27189] ? set_disk_ro+0x73/0x110 [ 1298.251386][T27189] sysfs_create_group+0x1b/0x20 [ 1298.256217][T27189] loop_configure+0xbcd/0xeb0 [ 1298.260873][T27189] lo_ioctl+0x618/0x13e0 [ 1298.265137][T27189] ? path_openat+0x18d4/0x1ec0 [ 1298.269956][T27189] ? blkdev_common_ioctl+0x438/0x1110 [ 1298.275401][T27189] ? selinux_file_ioctl+0x981/0xa10 [ 1298.280631][T27189] ? lo_release+0x120/0x120 [ 1298.285133][T27189] blkdev_ioctl+0x1d0/0x3f0 [ 1298.289635][T27189] block_ioctl+0x6e/0x80 [ 1298.294042][T27189] ? blkdev_iopoll+0x80/0x80 [ 1298.298782][T27189] __se_sys_ioctl+0xcb/0x140 [ 1298.303353][T27189] __x64_sys_ioctl+0x3f/0x50 [ 1298.307930][T27189] do_syscall_64+0x44/0xa0 [ 1298.312329][T27189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1298.318449][T27189] RIP: 0033:0x4663b7 [ 1298.322538][T27189] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.342788][T27189] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1298.351190][T27189] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1298.359163][T27189] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1298.367138][T27189] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1298.375268][T27189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1298.383242][T27189] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1298.391314][T27189] loop5: detected capacity change from 0 to 264192 [ 1298.407500][T27189] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1298.420524][T27189] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1298.432954][T27189] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f000007000001", 0x18}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:12 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:12 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002600, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1300.029834][T27221] loop3: detected capacity change from 0 to 264192 [ 1300.030456][T27223] FAULT_INJECTION: forcing a failure. [ 1300.030456][T27223] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.044154][T27225] loop0: detected capacity change from 0 to 264192 [ 1300.048986][T27223] CPU: 0 PID: 27223 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1300.049011][T27223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.074459][T27223] Call Trace: [ 1300.077737][T27223] dump_stack_lvl+0xd6/0x122 [ 1300.082391][T27223] dump_stack+0x11/0x1b [ 1300.086604][T27223] should_fail+0x23c/0x250 [ 1300.091034][T27223] ? __kernfs_new_node+0x6a/0x330 [ 1300.096101][T27223] __should_failslab+0x81/0x90 [ 1300.101034][T27223] should_failslab+0x5/0x20 [ 1300.105549][T27223] kmem_cache_alloc+0x4f/0x300 [ 1300.110346][T27223] ? __down_write_common+0x42/0x830 [ 1300.115556][T27223] __kernfs_new_node+0x6a/0x330 [ 1300.120435][T27223] ? up_write+0x25/0xc0 [ 1300.124581][T27223] kernfs_new_node+0x5b/0xd0 [ 1300.129228][T27223] __kernfs_create_file+0x45/0x1a0 [ 1300.134352][T27223] sysfs_add_file_mode_ns+0x1c1/0x250 [ 1300.139719][T27223] internal_create_group+0x2f4/0x860 [ 1300.144996][T27223] ? set_disk_ro+0x73/0x110 [ 1300.149550][T27223] sysfs_create_group+0x1b/0x20 [ 1300.154394][T27223] loop_configure+0xbcd/0xeb0 [ 1300.159068][T27223] lo_ioctl+0x618/0x13e0 [ 1300.163369][T27223] ? path_openat+0x18d4/0x1ec0 [ 1300.168294][T27223] ? blkdev_common_ioctl+0x438/0x1110 [ 1300.173704][T27223] ? selinux_file_ioctl+0x981/0xa10 [ 1300.179162][T27223] ? lo_release+0x120/0x120 [ 1300.183712][T27223] blkdev_ioctl+0x1d0/0x3f0 [ 1300.188203][T27223] block_ioctl+0x6e/0x80 [ 1300.192479][T27223] ? blkdev_iopoll+0x80/0x80 [ 1300.197067][T27223] __se_sys_ioctl+0xcb/0x140 [ 1300.201686][T27223] __x64_sys_ioctl+0x3f/0x50 [ 1300.206278][T27223] do_syscall_64+0x44/0xa0 [ 1300.210736][T27223] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1300.216990][T27223] RIP: 0033:0x4663b7 [ 1300.220872][T27223] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1300.240666][T27223] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1300.249069][T27223] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1300.257028][T27223] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1300.264986][T27223] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1300.272946][T27223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1300.280926][T27223] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1300.293706][T27225] FAULT_INJECTION: forcing a failure. [ 1300.293706][T27225] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.306469][T27225] CPU: 1 PID: 27225 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1300.315321][T27225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.321818][T27224] loop2: detected capacity change from 0 to 264192 [ 1300.325384][T27225] Call Trace: [ 1300.325393][T27225] dump_stack_lvl+0xd6/0x122 [ 1300.339805][T27225] dump_stack+0x11/0x1b [ 1300.343983][T27225] should_fail+0x23c/0x250 [ 1300.348391][T27225] __should_failslab+0x81/0x90 [ 1300.353264][T27225] ? call_usermodehelper_setup+0x71/0x190 [ 1300.360022][T27225] should_failslab+0x5/0x20 [ 1300.364519][T27225] kmem_cache_alloc_trace+0x52/0x320 [ 1300.369799][T27225] call_usermodehelper_setup+0x71/0x190 [ 1300.375353][T27225] ? add_uevent_var+0x1d0/0x1d0 [ 1300.380276][T27225] kobject_uevent_env+0xb29/0xc40 [ 1300.385428][T27225] ? internal_create_group+0x7d9/0x860 [ 1300.390886][T27225] ? set_capacity_and_notify+0x1eb/0x200 [ 1300.396515][T27225] kobject_uevent+0x18/0x20 [ 1300.401083][T27225] loop_configure+0xce1/0xeb0 [ 1300.405761][T27225] lo_ioctl+0x618/0x13e0 [ 1300.409996][T27225] ? path_openat+0x18d4/0x1ec0 [ 1300.414759][T27225] ? blkdev_common_ioctl+0x438/0x1110 [ 1300.420134][T27225] ? selinux_file_ioctl+0x981/0xa10 [ 1300.425505][T27225] ? lo_release+0x120/0x120 [ 1300.430092][T27225] blkdev_ioctl+0x1d0/0x3f0 [ 1300.434586][T27225] block_ioctl+0x6e/0x80 [ 1300.438822][T27225] ? blkdev_iopoll+0x80/0x80 [ 1300.443415][T27225] __se_sys_ioctl+0xcb/0x140 [ 1300.448179][T27225] __x64_sys_ioctl+0x3f/0x50 [ 1300.452779][T27225] do_syscall_64+0x44/0xa0 [ 1300.457559][T27225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1300.463465][T27225] RIP: 0033:0x4663b7 [ 1300.467424][T27225] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1300.487181][T27225] RSP: 002b:00007f1e348c5f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1300.495592][T27225] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1300.503645][T27225] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1300.511606][T27225] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1300.519573][T27225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1300.527532][T27225] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1300.541518][T27221] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1300.554716][T27223] loop5: detected capacity change from 0 to 264192 [ 1300.555070][T27224] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1300.572777][T27224] EXT4-fs (loop2): get root inode failed [ 1300.578527][T27224] EXT4-fs (loop2): mount failed [ 1300.585262][T27225] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1300.587802][T27221] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1300.609558][T27225] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1300.616342][T27221] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:13 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1300.629768][T27223] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1300.644167][T27225] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1300.672218][T27236] loop2: detected capacity change from 0 to 264192 08:59:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002f01, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:13 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1300.672328][T27223] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1300.697119][T27223] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:13 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:13 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1300.781597][T27264] loop2: detected capacity change from 0 to 264192 [ 1300.786185][T27265] loop0: detected capacity change from 0 to 264192 [ 1300.810330][T27275] loop3: detected capacity change from 0 to 264192 [ 1300.813233][T27264] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1300.825252][T27265] FAULT_INJECTION: forcing a failure. [ 1300.825252][T27265] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.828421][T27264] EXT4-fs (loop2): get root inode failed [ 1300.840945][T27265] CPU: 1 PID: 27265 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1300.846571][T27264] EXT4-fs (loop2): mount failed [ 1300.855385][T27265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.870708][T27265] Call Trace: [ 1300.874000][T27265] dump_stack_lvl+0xd6/0x122 [ 1300.878620][T27265] dump_stack+0x11/0x1b [ 1300.882837][T27265] should_fail+0x23c/0x250 [ 1300.887264][T27265] ? getname_flags+0x84/0x3f0 [ 1300.891960][T27265] __should_failslab+0x81/0x90 [ 1300.896730][T27265] should_failslab+0x5/0x20 [ 1300.901265][T27265] kmem_cache_alloc+0x4f/0x300 [ 1300.906040][T27265] getname_flags+0x84/0x3f0 [ 1300.910634][T27265] ? switch_fpu_return+0xa/0x10 [ 1300.915489][T27265] __x64_sys_mkdir+0x31/0x50 [ 1300.920162][T27265] do_syscall_64+0x44/0xa0 [ 1300.923662][T27281] loop5: detected capacity change from 0 to 264192 [ 1300.924584][T27265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1300.936957][T27265] RIP: 0033:0x465707 [ 1300.940938][T27265] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1300.956790][T27275] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1300.960827][T27265] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1300.960856][T27265] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1300.989249][T27281] FAULT_INJECTION: forcing a failure. [ 1300.989249][T27281] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.990548][T27265] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1300.990565][T27265] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1300.990578][T27265] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1301.027447][T27265] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1301.035579][T27281] CPU: 0 PID: 27281 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1301.042863][T27275] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1301.044340][T27281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.044353][T27281] Call Trace: [ 1301.044361][T27281] dump_stack_lvl+0xd6/0x122 [ 1301.062832][T27275] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001302, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1301.063669][T27281] dump_stack+0x11/0x1b [ 1301.063694][T27281] should_fail+0x23c/0x250 [ 1301.090671][T27281] ? kzalloc+0x1d/0x30 [ 1301.095617][T27281] __should_failslab+0x81/0x90 [ 1301.100845][T27281] should_failslab+0x5/0x20 [ 1301.105340][T27281] __kmalloc+0x6f/0x350 [ 1301.109560][T27281] kzalloc+0x1d/0x30 [ 1301.113684][T27281] kobject_get_path+0x7c/0x110 [ 1301.118464][T27281] kobject_uevent_env+0x1be/0xc40 [ 1301.123485][T27281] ? internal_create_group+0x7d9/0x860 [ 1301.128929][T27281] ? set_capacity_and_notify+0x1eb/0x200 [ 1301.135463][T27281] kobject_uevent+0x18/0x20 [ 1301.140044][T27281] loop_configure+0xce1/0xeb0 [ 1301.144836][T27281] lo_ioctl+0x618/0x13e0 [ 1301.149082][T27281] ? path_openat+0x18d4/0x1ec0 [ 1301.153939][T27281] ? blkdev_common_ioctl+0x438/0x1110 [ 1301.159421][T27281] ? selinux_file_ioctl+0x981/0xa10 [ 1301.164782][T27281] ? lo_release+0x120/0x120 [ 1301.169335][T27281] blkdev_ioctl+0x1d0/0x3f0 [ 1301.173835][T27281] block_ioctl+0x6e/0x80 [ 1301.178057][T27281] ? blkdev_iopoll+0x80/0x80 [ 1301.182758][T27281] __se_sys_ioctl+0xcb/0x140 [ 1301.187356][T27281] __x64_sys_ioctl+0x3f/0x50 [ 1301.191934][T27281] do_syscall_64+0x44/0xa0 [ 1301.196348][T27281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1301.202226][T27281] RIP: 0033:0x4663b7 [ 1301.206099][T27281] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1301.226133][T27281] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1301.234532][T27281] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1301.242491][T27281] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1301.250487][T27281] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1301.258452][T27281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1301.266473][T27281] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1301.325046][T27281] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1301.375430][T27303] loop3: detected capacity change from 0 to 264192 [ 1301.392969][T27281] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1301.403635][T27303] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1301.405144][T27281] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1301.423550][T27303] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1301.451154][T27303] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003001, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001402, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:15 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:15 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:15 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f000007000001", 0x18}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1303.058166][T27325] loop3: detected capacity change from 0 to 264192 [ 1303.071492][T27332] loop2: detected capacity change from 0 to 264192 [ 1303.078578][T27333] loop0: detected capacity change from 0 to 264192 [ 1303.086636][T27334] loop5: detected capacity change from 0 to 264192 [ 1303.093813][T27333] FAULT_INJECTION: forcing a failure. [ 1303.093813][T27333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1303.107023][T27333] CPU: 1 PID: 27333 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1303.115942][T27333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.126124][T27333] Call Trace: [ 1303.129406][T27333] dump_stack_lvl+0xd6/0x122 [ 1303.134007][T27333] dump_stack+0x11/0x1b [ 1303.138174][T27333] should_fail+0x23c/0x250 [ 1303.142626][T27333] should_fail_usercopy+0x16/0x20 [ 1303.147664][T27333] strncpy_from_user+0x21/0x250 [ 1303.152654][T27333] getname_flags+0xb8/0x3f0 [ 1303.157270][T27333] __x64_sys_mkdir+0x31/0x50 [ 1303.161855][T27333] do_syscall_64+0x44/0xa0 [ 1303.166270][T27333] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1303.172261][T27333] RIP: 0033:0x465707 [ 1303.176157][T27333] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.195751][T27333] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 08:59:15 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1303.204168][T27333] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1303.212136][T27333] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1303.220093][T27333] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1303.228102][T27333] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1303.236056][T27333] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001502, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1303.253916][T27334] FAULT_INJECTION: forcing a failure. [ 1303.253916][T27334] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.266653][T27334] CPU: 0 PID: 27334 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1303.275512][T27334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.285563][T27334] Call Trace: [ 1303.288842][T27334] dump_stack_lvl+0xd6/0x122 [ 1303.293436][T27334] dump_stack+0x11/0x1b [ 1303.297721][T27334] should_fail+0x23c/0x250 [ 1303.302140][T27334] __should_failslab+0x81/0x90 [ 1303.306991][T27334] should_failslab+0x5/0x20 [ 1303.310763][T27332] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1303.311497][T27334] kmem_cache_alloc_node+0x61/0x2c0 [ 1303.323002][T27332] EXT4-fs (loop2): get root inode failed [ 1303.328122][T27334] ? __alloc_skb+0xed/0x420 [ 1303.333831][T27332] EXT4-fs (loop2): mount failed [ 1303.343162][T27334] __alloc_skb+0xed/0x420 [ 1303.347475][T27334] alloc_uevent_skb+0x5b/0x120 [ 1303.352257][T27334] kobject_uevent_env+0x863/0xc40 [ 1303.357262][T27334] ? internal_create_group+0x7d9/0x860 [ 1303.362740][T27334] ? set_capacity_and_notify+0x1eb/0x200 [ 1303.368875][T27334] kobject_uevent+0x18/0x20 [ 1303.373362][T27334] loop_configure+0xce1/0xeb0 [ 1303.378020][T27334] lo_ioctl+0x618/0x13e0 [ 1303.382239][T27334] ? path_openat+0x18d4/0x1ec0 [ 1303.387016][T27334] ? blkdev_common_ioctl+0x438/0x1110 [ 1303.392421][T27334] ? selinux_file_ioctl+0x981/0xa10 [ 1303.397630][T27334] ? lo_release+0x120/0x120 [ 1303.402150][T27334] blkdev_ioctl+0x1d0/0x3f0 [ 1303.406705][T27334] block_ioctl+0x6e/0x80 [ 1303.411014][T27334] ? blkdev_iopoll+0x80/0x80 [ 1303.415608][T27334] __se_sys_ioctl+0xcb/0x140 [ 1303.420196][T27334] __x64_sys_ioctl+0x3f/0x50 [ 1303.424770][T27334] do_syscall_64+0x44/0xa0 [ 1303.429196][T27334] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1303.435142][T27334] RIP: 0033:0x4663b7 [ 1303.439031][T27334] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.458635][T27334] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1303.467036][T27334] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1303.474987][T27334] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1303.482939][T27334] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1303.490893][T27334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1303.499116][T27334] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:59:15 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1303.517808][T27334] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1303.544192][T27346] loop0: detected capacity change from 0 to 264192 [ 1303.549724][T27334] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1303.560764][T27346] FAULT_INJECTION: forcing a failure. [ 1303.560764][T27346] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.571200][T27334] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1303.573427][T27346] CPU: 0 PID: 27346 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1303.592585][T27346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.602820][T27346] Call Trace: [ 1303.606102][T27346] dump_stack_lvl+0xd6/0x122 [ 1303.610742][T27346] dump_stack+0x11/0x1b [ 1303.614923][T27346] should_fail+0x23c/0x250 [ 1303.619333][T27346] ? __d_alloc+0x36/0x370 [ 1303.623894][T27346] __should_failslab+0x81/0x90 [ 1303.628665][T27346] should_failslab+0x5/0x20 [ 1303.633184][T27346] kmem_cache_alloc+0x4f/0x300 [ 1303.637999][T27346] __d_alloc+0x36/0x370 [ 1303.642163][T27346] d_alloc+0x2a/0x130 [ 1303.646148][T27346] __lookup_hash+0x8f/0x180 [ 1303.650654][T27346] filename_create+0xfc/0x270 [ 1303.655441][T27346] do_mkdirat+0x53/0x2c0 [ 1303.659855][T27346] __x64_sys_mkdir+0x40/0x50 08:59:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003101, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1303.664501][T27346] do_syscall_64+0x44/0xa0 [ 1303.668948][T27346] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1303.674858][T27346] RIP: 0033:0x465707 [ 1303.678750][T27346] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.698472][T27346] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1303.702286][T27363] loop3: detected capacity change from 0 to 264192 08:59:16 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1303.706907][T27346] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1303.706923][T27346] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1303.706935][T27346] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1303.706947][T27346] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1303.706959][T27346] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1303.771545][T27363] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1303.772499][T27370] loop2: detected capacity change from 0 to 264192 [ 1303.797747][T27363] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 08:59:16 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:16 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1303.818607][T27370] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1303.830239][T27370] EXT4-fs (loop2): get root inode failed [ 1303.831203][T27363] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1303.836040][T27370] EXT4-fs (loop2): mount failed [ 1303.893750][T27384] loop5: detected capacity change from 0 to 264192 [ 1303.903597][T27389] loop0: detected capacity change from 0 to 264192 [ 1303.911418][T27384] FAULT_INJECTION: forcing a failure. [ 1303.911418][T27384] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.924196][T27384] CPU: 1 PID: 27384 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1303.933262][T27384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.943441][T27384] Call Trace: [ 1303.946708][T27384] dump_stack_lvl+0xd6/0x122 [ 1303.951338][T27384] dump_stack+0x11/0x1b [ 1303.955490][T27384] should_fail+0x23c/0x250 [ 1303.959977][T27384] __should_failslab+0x81/0x90 [ 1303.964833][T27384] should_failslab+0x5/0x20 [ 1303.969497][T27384] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1303.975211][T27384] ? __kmalloc_node_track_caller+0x30/0x40 [ 1303.981078][T27384] __kmalloc_node_track_caller+0x30/0x40 [ 1303.986710][T27384] ? alloc_uevent_skb+0x5b/0x120 [ 1303.991839][T27384] __alloc_skb+0x187/0x420 [ 1303.996244][T27384] alloc_uevent_skb+0x5b/0x120 [ 1304.001042][T27384] kobject_uevent_env+0x863/0xc40 [ 1304.006181][T27384] ? internal_create_group+0x7d9/0x860 [ 1304.011645][T27384] ? set_capacity_and_notify+0x1eb/0x200 [ 1304.017374][T27384] kobject_uevent+0x18/0x20 [ 1304.021886][T27384] loop_configure+0xce1/0xeb0 [ 1304.026565][T27384] lo_ioctl+0x618/0x13e0 [ 1304.030811][T27384] ? path_openat+0x18d4/0x1ec0 [ 1304.035572][T27384] ? blkdev_common_ioctl+0x438/0x1110 [ 1304.040984][T27384] ? selinux_file_ioctl+0x981/0xa10 [ 1304.046276][T27384] ? lo_release+0x120/0x120 [ 1304.050761][T27384] blkdev_ioctl+0x1d0/0x3f0 [ 1304.055264][T27384] block_ioctl+0x6e/0x80 [ 1304.059488][T27384] ? blkdev_iopoll+0x80/0x80 [ 1304.064063][T27384] __se_sys_ioctl+0xcb/0x140 [ 1304.068893][T27384] __x64_sys_ioctl+0x3f/0x50 [ 1304.073553][T27384] do_syscall_64+0x44/0xa0 [ 1304.077961][T27384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1304.083856][T27384] RIP: 0033:0x4663b7 [ 1304.087798][T27384] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.107491][T27384] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1304.115893][T27384] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1304.123958][T27384] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1304.131921][T27384] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1304.139872][T27384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1304.147830][T27384] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1304.162093][T27389] FAULT_INJECTION: forcing a failure. [ 1304.162093][T27389] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.174741][T27389] CPU: 0 PID: 27389 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1304.183547][T27389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.193641][T27389] Call Trace: [ 1304.196917][T27389] dump_stack_lvl+0xd6/0x122 [ 1304.201746][T27389] dump_stack+0x11/0x1b [ 1304.205910][T27389] should_fail+0x23c/0x250 [ 1304.210333][T27389] ? ext4_alloc_inode+0x27/0x300 [ 1304.214013][T27384] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1304.215326][T27389] __should_failslab+0x81/0x90 [ 1304.228902][T27384] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1304.232906][T27389] ? set_qf_name+0x230/0x230 [ 1304.242579][T27384] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1304.246581][T27389] should_failslab+0x5/0x20 [ 1304.246607][T27389] kmem_cache_alloc+0x4f/0x300 [ 1304.266403][T27389] ? ebitmap_destroy+0x91/0xa0 [ 1304.271255][T27389] ? set_qf_name+0x230/0x230 [ 1304.276007][T27389] ext4_alloc_inode+0x27/0x300 [ 1304.280808][T27389] ? set_qf_name+0x230/0x230 [ 1304.285465][T27389] new_inode_pseudo+0x38/0x1c0 [ 1304.290270][T27389] new_inode+0x21/0x120 [ 1304.294435][T27389] __ext4_new_inode+0x13f/0x2fd0 [ 1304.299389][T27389] ? __dquot_initialize+0x13d/0x7f0 [ 1304.304585][T27389] ext4_mkdir+0x28a/0x760 [ 1304.308921][T27389] vfs_mkdir+0x2c3/0x3e0 [ 1304.313227][T27389] do_mkdirat+0x12e/0x2c0 [ 1304.317615][T27389] __x64_sys_mkdir+0x40/0x50 [ 1304.322234][T27389] do_syscall_64+0x44/0xa0 [ 1304.326669][T27389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1304.332592][T27389] RIP: 0033:0x465707 [ 1304.336568][T27389] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.356331][T27389] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1304.364895][T27389] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1304.373198][T27389] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1304.381221][T27389] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1304.389174][T27389] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1304.397136][T27389] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001602, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:18 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:18 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003600, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:18 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1306.073562][T27422] loop0: detected capacity change from 0 to 264192 [ 1306.089660][T27422] FAULT_INJECTION: forcing a failure. [ 1306.089660][T27422] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.097247][T27434] loop3: detected capacity change from 0 to 264192 [ 1306.102489][T27422] CPU: 0 PID: 27422 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1306.117890][T27422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.127947][T27422] Call Trace: [ 1306.131258][T27422] dump_stack_lvl+0xd6/0x122 [ 1306.135921][T27422] dump_stack+0x11/0x1b [ 1306.136356][T27434] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1306.140169][T27422] should_fail+0x23c/0x250 [ 1306.140193][T27422] ? getname_flags+0x84/0x3f0 [ 1306.140217][T27422] __should_failslab+0x81/0x90 [ 1306.164536][T27434] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1306.166954][T27422] should_failslab+0x5/0x20 [ 1306.166983][T27422] kmem_cache_alloc+0x4f/0x300 [ 1306.167001][T27422] getname_flags+0x84/0x3f0 [ 1306.167025][T27422] ? switch_fpu_return+0xa/0x10 [ 1306.176591][T27420] loop2: detected capacity change from 0 to 264192 [ 1306.180765][T27422] __x64_sys_mkdir+0x31/0x50 [ 1306.180799][T27422] do_syscall_64+0x44/0xa0 [ 1306.210343][T27422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1306.216273][T27422] RIP: 0033:0x465707 [ 1306.220171][T27422] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1306.228334][T27423] loop5: detected capacity change from 0 to 264192 [ 1306.240128][T27422] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1306.240158][T27422] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1306.240170][T27422] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1306.240187][T27422] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1306.269198][T27434] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1306.271274][T27422] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1306.271291][T27422] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1306.299971][T27423] FAULT_INJECTION: forcing a failure. [ 1306.299971][T27423] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.308031][T27420] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1306.318346][T27423] CPU: 1 PID: 27423 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1306.318371][T27423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.318381][T27423] Call Trace: [ 1306.318389][T27423] dump_stack_lvl+0xd6/0x122 [ 1306.329841][T27420] EXT4-fs (loop2): get root inode failed [ 1306.338570][T27423] dump_stack+0x11/0x1b [ 1306.338591][T27423] should_fail+0x23c/0x250 08:59:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001802, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1306.348745][T27420] EXT4-fs (loop2): mount failed [ 1306.352258][T27423] ? skb_clone+0x12c/0x1f0 [ 1306.380223][T27423] __should_failslab+0x81/0x90 [ 1306.384998][T27423] should_failslab+0x5/0x20 [ 1306.389560][T27423] kmem_cache_alloc+0x4f/0x300 [ 1306.394395][T27423] skb_clone+0x12c/0x1f0 [ 1306.398687][T27423] netlink_broadcast_filtered+0x4fd/0xb60 [ 1306.404513][T27423] ? skb_put+0xb9/0xf0 [ 1306.408746][T27423] netlink_broadcast+0x35/0x50 [ 1306.413766][T27423] kobject_uevent_env+0x8c9/0xc40 [ 1306.418988][T27423] ? internal_create_group+0x7d9/0x860 [ 1306.425492][T27423] ? set_capacity_and_notify+0x1eb/0x200 [ 1306.431135][T27423] kobject_uevent+0x18/0x20 [ 1306.435648][T27423] loop_configure+0xce1/0xeb0 [ 1306.440317][T27423] lo_ioctl+0x618/0x13e0 [ 1306.444589][T27423] ? path_openat+0x18d4/0x1ec0 [ 1306.449342][T27423] ? finish_task_switch+0xce/0x290 [ 1306.454467][T27423] ? blkdev_common_ioctl+0x438/0x1110 [ 1306.459873][T27423] ? selinux_file_ioctl+0x981/0xa10 [ 1306.465060][T27423] ? lo_release+0x120/0x120 [ 1306.469633][T27423] blkdev_ioctl+0x1d0/0x3f0 [ 1306.474202][T27423] block_ioctl+0x6e/0x80 [ 1306.478477][T27423] ? blkdev_iopoll+0x80/0x80 [ 1306.483061][T27423] __se_sys_ioctl+0xcb/0x140 [ 1306.487638][T27423] __x64_sys_ioctl+0x3f/0x50 [ 1306.492218][T27423] do_syscall_64+0x44/0xa0 [ 1306.496727][T27423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1306.502665][T27423] RIP: 0033:0x4663b7 [ 1306.506547][T27423] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1306.527305][T27423] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1306.535770][T27423] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1306.543731][T27423] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1306.551875][T27423] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1306.559845][T27423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1306.567899][T27423] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 08:59:19 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:19 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1306.620205][T27423] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1306.649152][T27463] loop3: detected capacity change from 0 to 264192 08:59:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003f00, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1306.668401][T27468] loop0: detected capacity change from 0 to 264192 [ 1306.676241][T27423] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1306.708305][T27477] loop2: detected capacity change from 0 to 264192 [ 1306.721753][T27468] FAULT_INJECTION: forcing a failure. [ 1306.721753][T27468] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.734392][T27468] CPU: 0 PID: 27468 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1306.743593][T27468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.753084][T27423] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1306.753647][T27468] Call Trace: [ 1306.753656][T27468] dump_stack_lvl+0xd6/0x122 [ 1306.772171][T27468] dump_stack+0x11/0x1b [ 1306.776417][T27468] should_fail+0x23c/0x250 [ 1306.780984][T27468] ? sidtab_sid2str_get+0x9c/0x130 [ 1306.786140][T27468] __should_failslab+0x81/0x90 [ 1306.790913][T27468] should_failslab+0x5/0x20 [ 1306.795428][T27468] __kmalloc_track_caller+0x6d/0x350 [ 1306.800970][T27468] kmemdup+0x21/0x50 [ 1306.804986][T27468] sidtab_sid2str_get+0x9c/0x130 [ 1306.810067][T27468] security_sid_to_context_core+0x1cb/0x2d0 [ 1306.816061][T27468] security_sid_to_context_force+0x2f/0x40 [ 1306.821892][T27468] selinux_inode_init_security+0x4e4/0x590 [ 1306.827705][T27468] security_inode_init_security+0xe4/0x260 [ 1306.833611][T27468] ? ext4_init_security+0x40/0x40 [ 1306.838647][T27468] ext4_init_security+0x30/0x40 [ 1306.843561][T27468] __ext4_new_inode+0x2a0a/0x2fd0 [ 1306.848590][T27468] ext4_mkdir+0x28a/0x760 [ 1306.853016][T27468] vfs_mkdir+0x2c3/0x3e0 [ 1306.857297][T27468] do_mkdirat+0x12e/0x2c0 [ 1306.861638][T27468] __x64_sys_mkdir+0x40/0x50 [ 1306.866252][T27468] do_syscall_64+0x44/0xa0 [ 1306.867885][T27477] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1306.870737][T27468] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1306.882230][T27477] EXT4-fs (loop2): get root inode failed [ 1306.888106][T27468] RIP: 0033:0x465707 [ 1306.888123][T27468] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:59:19 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:19 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001902, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1306.888141][T27468] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 [ 1306.893744][T27477] EXT4-fs (loop2): mount failed [ 1306.897610][T27468] ORIG_RAX: 0000000000000053 [ 1306.897620][T27468] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1306.897634][T27468] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1306.938457][T27487] loop3: detected capacity change from 0 to 264192 [ 1306.940919][T27468] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1306.940936][T27468] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 08:59:19 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1306.971503][T27468] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1306.980163][T27487] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1306.995569][T27487] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1307.010223][T27487] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:19 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1307.066986][T27507] loop5: detected capacity change from 0 to 264192 [ 1307.073781][T27507] FAULT_INJECTION: forcing a failure. [ 1307.073781][T27507] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.086432][T27507] CPU: 0 PID: 27507 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1307.090914][T27512] loop0: detected capacity change from 0 to 264192 [ 1307.095191][T27507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.095205][T27507] Call Trace: [ 1307.095212][T27507] dump_stack_lvl+0xd6/0x122 [ 1307.104713][T27513] loop2: detected capacity change from 0 to 264192 [ 1307.111731][T27507] dump_stack+0x11/0x1b [ 1307.111755][T27507] should_fail+0x23c/0x250 [ 1307.111772][T27507] __should_failslab+0x81/0x90 [ 1307.139456][T27507] ? call_usermodehelper_setup+0x71/0x190 [ 1307.139475][T27512] FAULT_INJECTION: forcing a failure. [ 1307.139475][T27512] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.157737][T27507] should_failslab+0x5/0x20 [ 1307.162237][T27507] kmem_cache_alloc_trace+0x52/0x320 [ 1307.167685][T27507] call_usermodehelper_setup+0x71/0x190 [ 1307.173275][T27507] ? add_uevent_var+0x1d0/0x1d0 [ 1307.178215][T27507] kobject_uevent_env+0xb29/0xc40 [ 1307.183275][T27507] ? internal_create_group+0x7d9/0x860 [ 1307.188722][T27507] ? set_capacity_and_notify+0x1eb/0x200 [ 1307.194360][T27507] kobject_uevent+0x18/0x20 [ 1307.198875][T27507] loop_configure+0xce1/0xeb0 [ 1307.203548][T27507] lo_ioctl+0x618/0x13e0 [ 1307.207805][T27507] ? path_openat+0x18d4/0x1ec0 [ 1307.212967][T27507] ? blkdev_common_ioctl+0x438/0x1110 [ 1307.218421][T27507] ? selinux_file_ioctl+0x981/0xa10 [ 1307.223612][T27507] ? lo_release+0x120/0x120 [ 1307.228158][T27507] blkdev_ioctl+0x1d0/0x3f0 [ 1307.232652][T27507] block_ioctl+0x6e/0x80 [ 1307.236965][T27507] ? blkdev_iopoll+0x80/0x80 [ 1307.241607][T27507] __se_sys_ioctl+0xcb/0x140 [ 1307.246201][T27507] __x64_sys_ioctl+0x3f/0x50 [ 1307.250778][T27507] do_syscall_64+0x44/0xa0 [ 1307.255189][T27507] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1307.261354][T27507] RIP: 0033:0x4663b7 [ 1307.265278][T27507] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.284985][T27507] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1307.293385][T27507] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1307.301344][T27507] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1307.309329][T27507] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1307.317285][T27507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1307.325245][T27507] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1307.333383][T27512] CPU: 1 PID: 27512 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1307.342156][T27512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.352200][T27512] Call Trace: [ 1307.355475][T27512] dump_stack_lvl+0xd6/0x122 [ 1307.360068][T27512] dump_stack+0x11/0x1b [ 1307.364230][T27512] should_fail+0x23c/0x250 [ 1307.368648][T27512] ? sidtab_sid2str_get+0x9c/0x130 [ 1307.373754][T27512] __should_failslab+0x81/0x90 [ 1307.378571][T27512] should_failslab+0x5/0x20 [ 1307.383068][T27512] __kmalloc_track_caller+0x6d/0x350 [ 1307.388372][T27512] kmemdup+0x21/0x50 [ 1307.392267][T27512] sidtab_sid2str_get+0x9c/0x130 [ 1307.397208][T27512] security_sid_to_context_core+0x1cb/0x2d0 [ 1307.403224][T27512] security_sid_to_context_force+0x2f/0x40 [ 1307.409035][T27512] selinux_inode_init_security+0x4e4/0x590 [ 1307.414928][T27512] security_inode_init_security+0xe4/0x260 [ 1307.420793][T27512] ? ext4_init_security+0x40/0x40 [ 1307.425958][T27512] ext4_init_security+0x30/0x40 [ 1307.430821][T27512] __ext4_new_inode+0x2a0a/0x2fd0 [ 1307.436199][T27512] ext4_mkdir+0x28a/0x760 [ 1307.440550][T27512] vfs_mkdir+0x2c3/0x3e0 [ 1307.444849][T27512] do_mkdirat+0x12e/0x2c0 [ 1307.449187][T27512] __x64_sys_mkdir+0x40/0x50 [ 1307.453988][T27512] do_syscall_64+0x44/0xa0 [ 1307.458472][T27512] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1307.464361][T27512] RIP: 0033:0x465707 [ 1307.468266][T27512] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.487956][T27512] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1307.496362][T27512] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1307.504368][T27512] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 08:59:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001a02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1307.512528][T27512] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1307.520491][T27512] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1307.528466][T27512] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1307.548747][T27513] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1307.560346][T27513] EXT4-fs (loop2): get root inode failed 08:59:20 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1307.566073][T27513] EXT4-fs (loop2): mount failed [ 1307.584834][T27507] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1307.599003][T27530] loop3: detected capacity change from 0 to 264192 [ 1307.603465][T27507] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1307.615924][T27507] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1307.634236][T27530] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1307.686191][T27530] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1307.696963][T27530] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:21 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:21 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:21 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001b02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1309.432891][T27561] loop5: detected capacity change from 0 to 264192 [ 1309.434017][T27558] loop2: detected capacity change from 0 to 264192 [ 1309.447615][T27562] loop0: detected capacity change from 0 to 264192 [ 1309.449277][T27561] FAULT_INJECTION: forcing a failure. [ 1309.449277][T27561] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.454245][T27559] loop3: detected capacity change from 0 to 264192 [ 1309.466748][T27561] CPU: 0 PID: 27561 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1309.482329][T27561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.492379][T27561] Call Trace: [ 1309.495657][T27561] dump_stack_lvl+0xd6/0x122 [ 1309.500501][T27561] dump_stack+0x11/0x1b [ 1309.504680][T27561] should_fail+0x23c/0x250 [ 1309.509084][T27561] ? skb_clone+0x12c/0x1f0 [ 1309.513535][T27561] __should_failslab+0x81/0x90 [ 1309.518373][T27561] should_failslab+0x5/0x20 [ 1309.522866][T27561] kmem_cache_alloc+0x4f/0x300 [ 1309.527695][T27561] skb_clone+0x12c/0x1f0 [ 1309.531995][T27561] netlink_broadcast_filtered+0x4fd/0xb60 [ 1309.537736][T27561] ? skb_put+0xb9/0xf0 [ 1309.541806][T27561] netlink_broadcast+0x35/0x50 [ 1309.546833][T27561] kobject_uevent_env+0x8c9/0xc40 [ 1309.551911][T27561] ? internal_create_group+0x7d9/0x860 [ 1309.557369][T27561] ? set_capacity_and_notify+0x1eb/0x200 [ 1309.563034][T27561] kobject_uevent+0x18/0x20 [ 1309.567765][T27561] loop_configure+0xce1/0xeb0 [ 1309.572506][T27561] lo_ioctl+0x618/0x13e0 [ 1309.576740][T27561] ? path_openat+0x18d4/0x1ec0 [ 1309.581627][T27561] ? blkdev_common_ioctl+0x438/0x1110 [ 1309.587343][T27561] ? selinux_file_ioctl+0x981/0xa10 [ 1309.592534][T27561] ? lo_release+0x120/0x120 [ 1309.597201][T27561] blkdev_ioctl+0x1d0/0x3f0 [ 1309.601868][T27561] block_ioctl+0x6e/0x80 [ 1309.606106][T27561] ? blkdev_iopoll+0x80/0x80 [ 1309.610685][T27561] __se_sys_ioctl+0xcb/0x140 [ 1309.615270][T27561] __x64_sys_ioctl+0x3f/0x50 [ 1309.619868][T27561] do_syscall_64+0x44/0xa0 [ 1309.624395][T27561] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1309.630413][T27561] RIP: 0033:0x4663b7 [ 1309.634301][T27561] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.654274][T27561] RSP: 002b:00007f28bfd50f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1309.662695][T27561] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1309.670648][T27561] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1309.678688][T27561] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1309.686694][T27561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1309.694733][T27561] R13: 0000000000000004 R14: 0000000020000348 R15: 0000000000000003 [ 1309.707980][T27562] FAULT_INJECTION: forcing a failure. [ 1309.707980][T27562] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.720603][T27562] CPU: 1 PID: 27562 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1309.729385][T27562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.739482][T27562] Call Trace: [ 1309.742760][T27562] dump_stack_lvl+0xd6/0x122 [ 1309.747408][T27562] dump_stack+0x11/0x1b [ 1309.751549][T27562] should_fail+0x23c/0x250 [ 1309.755987][T27562] ? __es_insert_extent+0x51f/0xe70 [ 1309.761173][T27562] __should_failslab+0x81/0x90 [ 1309.765925][T27562] should_failslab+0x5/0x20 [ 1309.770495][T27562] kmem_cache_alloc+0x4f/0x300 [ 1309.775283][T27562] ? __getblk_gfp+0x3f/0x590 [ 1309.779876][T27562] __es_insert_extent+0x51f/0xe70 [ 1309.784977][T27562] ext4_es_insert_extent+0x1cb/0x1950 [ 1309.790391][T27562] ext4_ext_map_blocks+0x100a/0x1ff0 [ 1309.795732][T27562] ? kcsan_setup_watchpoint+0x241/0x3f0 [ 1309.801266][T27562] ext4_map_blocks+0x1cf/0xf00 [ 1309.806025][T27562] ext4_getblk+0xc6/0x3e0 [ 1309.810488][T27562] ext4_bread+0x28/0x100 [ 1309.814743][T27562] ext4_append+0xd1/0x1c0 [ 1309.819500][T27562] ext4_init_new_dir+0x177/0x500 [ 1309.824435][T27562] ext4_mkdir+0x329/0x760 [ 1309.828804][T27562] vfs_mkdir+0x2c3/0x3e0 [ 1309.833103][T27562] do_mkdirat+0x12e/0x2c0 [ 1309.838032][T27562] __x64_sys_mkdir+0x40/0x50 [ 1309.842664][T27562] do_syscall_64+0x44/0xa0 [ 1309.847121][T27562] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1309.853020][T27562] RIP: 0033:0x465707 [ 1309.856988][T27562] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.876671][T27562] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1309.885077][T27562] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1309.893858][T27562] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1309.901841][T27562] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1309.909803][T27562] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1309.917790][T27562] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:22 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x114}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1309.956722][T27558] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1309.967278][T27559] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1309.968324][T27558] EXT4-fs (loop2): get root inode failed [ 1309.981392][T27559] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1309.986780][T27558] EXT4-fs (loop2): mount failed [ 1310.008452][T27559] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1310.027302][T27561] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1310.036472][T27562] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature 08:59:22 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12f}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001c02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1310.062262][T27561] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1310.063301][T27562] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1310.075087][T27561] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:22 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:22 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1310.106533][T27562] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14006900, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1310.155950][T27597] loop3: detected capacity change from 0 to 264192 [ 1310.184213][T27603] loop2: detected capacity change from 0 to 264192 [ 1310.221410][T27617] loop0: detected capacity change from 0 to 264192 [ 1310.223678][T27618] loop5: detected capacity change from 0 to 264192 [ 1310.230185][T27617] FAULT_INJECTION: forcing a failure. [ 1310.230185][T27617] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.238008][T27618] FAULT_INJECTION: forcing a failure. [ 1310.238008][T27618] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1310.247242][T27617] CPU: 1 PID: 27617 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1310.247267][T27617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.279071][T27617] Call Trace: [ 1310.282344][T27617] dump_stack_lvl+0xd6/0x122 [ 1310.286932][T27617] dump_stack+0x11/0x1b [ 1310.291213][T27617] should_fail+0x23c/0x250 [ 1310.295635][T27617] ? kcalloc+0x32/0x50 [ 1310.299810][T27617] __should_failslab+0x81/0x90 [ 1310.304661][T27617] should_failslab+0x5/0x20 [ 1310.309179][T27617] __kmalloc+0x6f/0x350 [ 1310.313445][T27617] kcalloc+0x32/0x50 [ 1310.317348][T27617] ext4_find_extent+0x21c/0x7f0 [ 1310.322292][T27617] ? kfree+0xf8/0x1d0 [ 1310.326261][T27617] ext4_ext_map_blocks+0x115/0x1ff0 [ 1310.331485][T27617] ext4_map_blocks+0x71e/0xf00 [ 1310.336254][T27617] ext4_getblk+0xc6/0x3e0 [ 1310.340575][T27617] ext4_bread+0x28/0x100 [ 1310.344902][T27617] ext4_append+0xd1/0x1c0 [ 1310.349251][T27617] ext4_init_new_dir+0x177/0x500 [ 1310.354178][T27617] ext4_mkdir+0x329/0x760 [ 1310.358562][T27617] vfs_mkdir+0x2c3/0x3e0 [ 1310.362801][T27617] do_mkdirat+0x12e/0x2c0 [ 1310.367184][T27617] __x64_sys_mkdir+0x40/0x50 [ 1310.371766][T27617] do_syscall_64+0x44/0xa0 [ 1310.376175][T27617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1310.382089][T27617] RIP: 0033:0x465707 [ 1310.386039][T27617] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1310.405640][T27617] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1310.414068][T27617] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1310.422040][T27617] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1310.430149][T27617] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1310.438138][T27617] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1310.446236][T27617] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1310.454211][T27618] CPU: 0 PID: 27618 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1310.463509][T27618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.473620][T27618] Call Trace: [ 1310.476896][T27618] dump_stack_lvl+0xd6/0x122 [ 1310.481505][T27618] dump_stack+0x11/0x1b [ 1310.485706][T27618] should_fail+0x23c/0x250 [ 1310.490123][T27618] should_fail_usercopy+0x16/0x20 [ 1310.495184][T27618] strncpy_from_user+0x21/0x250 [ 1310.500057][T27618] getname_flags+0xb8/0x3f0 [ 1310.504583][T27618] __x64_sys_mkdir+0x31/0x50 [ 1310.509269][T27618] do_syscall_64+0x44/0xa0 [ 1310.513777][T27618] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1310.519678][T27618] RIP: 0033:0x465707 [ 1310.523571][T27618] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1310.543285][T27618] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1310.551874][T27618] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1310.559845][T27618] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1310.567921][T27618] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1310.575899][T27618] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1310.583874][T27618] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e4", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001d02, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:24 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15f}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007803, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:24 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:24 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1312.452230][T27653] loop5: detected capacity change from 0 to 264192 [ 1312.452651][T27650] loop3: detected capacity change from 0 to 264192 [ 1312.459208][T27654] loop0: detected capacity change from 0 to 264192 [ 1312.475801][T27653] FAULT_INJECTION: forcing a failure. [ 1312.475801][T27653] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.476450][T27655] loop2: detected capacity change from 0 to 264192 [ 1312.488481][T27653] CPU: 1 PID: 27653 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1312.503701][T27653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.513864][T27653] Call Trace: [ 1312.517189][T27653] dump_stack_lvl+0xd6/0x122 [ 1312.520608][T27654] FAULT_INJECTION: forcing a failure. [ 1312.520608][T27654] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.521787][T27653] dump_stack+0x11/0x1b [ 1312.538505][T27653] should_fail+0x23c/0x250 [ 1312.542906][T27653] ? getname_flags+0x84/0x3f0 [ 1312.547618][T27653] __should_failslab+0x81/0x90 [ 1312.552421][T27653] should_failslab+0x5/0x20 [ 1312.556922][T27653] kmem_cache_alloc+0x4f/0x300 [ 1312.561683][T27653] getname_flags+0x84/0x3f0 [ 1312.566176][T27653] ? switch_fpu_return+0xa/0x10 [ 1312.571011][T27653] __x64_sys_mkdir+0x31/0x50 [ 1312.575657][T27653] do_syscall_64+0x44/0xa0 [ 1312.580144][T27653] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1312.586061][T27653] RIP: 0033:0x465707 [ 1312.589945][T27653] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1312.609630][T27653] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1312.618038][T27653] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1312.626067][T27653] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1312.634027][T27653] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1312.642008][T27653] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1312.650012][T27653] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1312.657972][T27654] CPU: 0 PID: 27654 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1312.666789][T27654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.676845][T27654] Call Trace: [ 1312.680141][T27654] dump_stack_lvl+0xd6/0x122 [ 1312.684733][T27654] dump_stack+0x11/0x1b [ 1312.688890][T27654] should_fail+0x23c/0x250 [ 1312.693310][T27654] ? ext4_mb_new_blocks+0x317/0x1fc0 [ 1312.698586][T27654] __should_failslab+0x81/0x90 [ 1312.703376][T27654] should_failslab+0x5/0x20 [ 1312.707875][T27654] kmem_cache_alloc+0x4f/0x300 [ 1312.712623][T27654] ext4_mb_new_blocks+0x317/0x1fc0 [ 1312.717719][T27654] ? ext4_find_extent+0x6cf/0x7f0 [ 1312.722735][T27654] ? ext4_ext_search_right+0x300/0x540 [ 1312.728181][T27654] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1312.733894][T27654] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1312.739175][T27654] ext4_map_blocks+0x71e/0xf00 [ 1312.743932][T27654] ext4_getblk+0xc6/0x3e0 [ 1312.748255][T27654] ext4_bread+0x28/0x100 [ 1312.752486][T27654] ext4_append+0xd1/0x1c0 [ 1312.756805][T27654] ext4_init_new_dir+0x177/0x500 [ 1312.761729][T27654] ext4_mkdir+0x329/0x760 [ 1312.766048][T27654] vfs_mkdir+0x2c3/0x3e0 [ 1312.770373][T27654] do_mkdirat+0x12e/0x2c0 [ 1312.774747][T27654] __x64_sys_mkdir+0x40/0x50 [ 1312.779333][T27654] do_syscall_64+0x44/0xa0 [ 1312.783814][T27654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1312.789705][T27654] RIP: 0033:0x465707 [ 1312.793584][T27654] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1312.813217][T27654] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1312.821628][T27654] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1312.830105][T27654] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1312.838068][T27654] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1312.846023][T27654] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 08:59:25 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:25 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1312.853993][T27654] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e4", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002403, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:25 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1312.939880][T27655] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1312.951501][T27655] EXT4-fs (loop2): get root inode failed [ 1312.957178][T27655] EXT4-fs (loop2): mount failed 08:59:25 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21d}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1312.993561][T27691] loop3: detected capacity change from 0 to 264192 [ 1313.019790][T27697] loop0: detected capacity change from 0 to 264192 [ 1313.020320][T27696] loop5: detected capacity change from 0 to 264192 [ 1313.033113][T27696] FAULT_INJECTION: forcing a failure. [ 1313.033113][T27696] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.045764][T27696] CPU: 1 PID: 27696 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1313.050042][T27691] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1313.054962][T27696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.054977][T27696] Call Trace: [ 1313.054985][T27696] dump_stack_lvl+0xd6/0x122 [ 1313.085966][T27696] dump_stack+0x11/0x1b [ 1313.090120][T27696] should_fail+0x23c/0x250 [ 1313.094528][T27696] ? ext4_alloc_inode+0x27/0x300 [ 1313.099675][T27696] __should_failslab+0x81/0x90 [ 1313.104427][T27696] ? set_qf_name+0x230/0x230 [ 1313.109002][T27696] should_failslab+0x5/0x20 [ 1313.113546][T27696] kmem_cache_alloc+0x4f/0x300 [ 1313.118298][T27696] ? ebitmap_destroy+0x91/0xa0 [ 1313.123054][T27696] ? set_qf_name+0x230/0x230 [ 1313.127705][T27696] ext4_alloc_inode+0x27/0x300 [ 1313.132456][T27696] ? set_qf_name+0x230/0x230 [ 1313.137032][T27696] new_inode_pseudo+0x38/0x1c0 [ 1313.141814][T27696] new_inode+0x21/0x120 [ 1313.146140][T27696] __ext4_new_inode+0x13f/0x2fd0 [ 1313.151073][T27696] ? __dquot_initialize+0x13d/0x7f0 [ 1313.156259][T27696] ext4_mkdir+0x28a/0x760 [ 1313.160591][T27696] vfs_mkdir+0x2c3/0x3e0 [ 1313.164871][T27696] do_mkdirat+0x12e/0x2c0 [ 1313.169193][T27696] __x64_sys_mkdir+0x40/0x50 [ 1313.173841][T27696] do_syscall_64+0x44/0xa0 [ 1313.178279][T27696] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1313.184244][T27696] RIP: 0033:0x465707 [ 1313.188134][T27696] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1313.207806][T27696] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1313.216224][T27696] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1313.224280][T27696] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1313.232688][T27696] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff 08:59:25 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1313.240645][T27696] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1313.248604][T27696] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1313.279313][T27697] FAULT_INJECTION: forcing a failure. [ 1313.279313][T27697] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.291979][T27697] CPU: 1 PID: 27697 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1313.300861][T27697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.310920][T27697] Call Trace: [ 1313.314218][T27697] dump_stack_lvl+0xd6/0x122 [ 1313.318828][T27697] dump_stack+0x11/0x1b [ 1313.323000][T27697] should_fail+0x23c/0x250 [ 1313.327406][T27697] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 1313.332678][T27697] __should_failslab+0x81/0x90 [ 1313.337754][T27697] should_failslab+0x5/0x20 [ 1313.342245][T27697] kmem_cache_alloc+0x4f/0x300 [ 1313.346993][T27697] ext4_mb_new_blocks+0x73f/0x1fc0 [ 1313.352149][T27697] ? ext4_find_extent+0x6cf/0x7f0 [ 1313.357226][T27697] ? ext4_ext_search_right+0x300/0x540 [ 1313.362758][T27697] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1313.368487][T27697] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1313.373756][T27697] ext4_map_blocks+0x71e/0xf00 [ 1313.378509][T27697] ext4_getblk+0xc6/0x3e0 [ 1313.382830][T27697] ext4_bread+0x28/0x100 [ 1313.387061][T27697] ext4_append+0xd1/0x1c0 [ 1313.391375][T27697] ext4_init_new_dir+0x177/0x500 [ 1313.396746][T27697] ext4_mkdir+0x329/0x760 [ 1313.401061][T27697] vfs_mkdir+0x2c3/0x3e0 [ 1313.405769][T27697] do_mkdirat+0x12e/0x2c0 [ 1313.410095][T27697] __x64_sys_mkdir+0x40/0x50 [ 1313.414726][T27697] do_syscall_64+0x44/0xa0 [ 1313.419256][T27697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1313.425149][T27697] RIP: 0033:0x465707 [ 1313.429029][T27697] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1313.448803][T27697] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1313.457207][T27697] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1313.465224][T27697] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1313.473352][T27697] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1313.481447][T27697] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 08:59:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007903, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1313.489401][T27697] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:25 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1313.517771][T27691] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1313.527943][T27691] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002801, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1313.599879][T27726] loop2: detected capacity change from 0 to 264192 [ 1313.600598][T27724] loop5: detected capacity change from 0 to 264192 [ 1313.627082][T27732] loop0: detected capacity change from 0 to 264192 [ 1313.633851][T27724] FAULT_INJECTION: forcing a failure. [ 1313.633851][T27724] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.646535][T27724] CPU: 1 PID: 27724 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1313.655295][T27724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.665443][T27724] Call Trace: [ 1313.668743][T27724] dump_stack_lvl+0xd6/0x122 [ 1313.673391][T27724] dump_stack+0x11/0x1b [ 1313.677575][T27724] should_fail+0x23c/0x250 [ 1313.681999][T27724] ? security_inode_alloc+0x30/0x180 [ 1313.687316][T27724] __should_failslab+0x81/0x90 [ 1313.692082][T27724] should_failslab+0x5/0x20 [ 1313.692791][T27742] loop3: detected capacity change from 0 to 264192 [ 1313.696632][T27724] kmem_cache_alloc+0x4f/0x300 [ 1313.696655][T27724] security_inode_alloc+0x30/0x180 [ 1313.708082][T27726] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1313.712991][T27724] inode_init_always+0x20d/0x440 [ 1313.713022][T27724] ? set_qf_name+0x230/0x230 [ 1313.724484][T27726] EXT4-fs (loop2): get root inode failed [ 1313.729358][T27724] new_inode_pseudo+0x73/0x1c0 [ 1313.733939][T27726] EXT4-fs (loop2): mount failed 08:59:26 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d5}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1313.739542][T27724] new_inode+0x21/0x120 [ 1313.753512][T27724] __ext4_new_inode+0x13f/0x2fd0 [ 1313.758515][T27724] ? __dquot_initialize+0x13d/0x7f0 [ 1313.763712][T27724] ext4_mkdir+0x28a/0x760 [ 1313.768054][T27724] vfs_mkdir+0x2c3/0x3e0 [ 1313.772302][T27724] do_mkdirat+0x12e/0x2c0 [ 1313.776690][T27724] __x64_sys_mkdir+0x40/0x50 [ 1313.780694][T27732] FAULT_INJECTION: forcing a failure. [ 1313.780694][T27732] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.781287][T27724] do_syscall_64+0x44/0xa0 [ 1313.798234][T27724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1313.804534][T27724] RIP: 0033:0x465707 [ 1313.808521][T27724] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1313.828203][T27724] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1313.837297][T27724] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1313.845257][T27724] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1313.853215][T27724] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1313.861254][T27724] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1313.869282][T27724] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1313.877345][T27732] CPU: 0 PID: 27732 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1313.886278][T27732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.896397][T27732] Call Trace: [ 1313.899808][T27732] dump_stack_lvl+0xd6/0x122 [ 1313.904411][T27732] dump_stack+0x11/0x1b [ 1313.908578][T27732] should_fail+0x23c/0x250 [ 1313.913077][T27732] ? __es_insert_extent+0x51f/0xe70 [ 1313.918313][T27732] __should_failslab+0x81/0x90 [ 1313.923078][T27732] should_failslab+0x5/0x20 [ 1313.927606][T27732] kmem_cache_alloc+0x4f/0x300 [ 1313.932357][T27732] __es_insert_extent+0x51f/0xe70 [ 1313.937381][T27732] ext4_es_insert_extent+0x1cb/0x1950 [ 1313.942745][T27732] ext4_map_blocks+0xa5d/0xf00 [ 1313.947577][T27732] ext4_getblk+0xc6/0x3e0 [ 1313.951908][T27732] ext4_bread+0x28/0x100 [ 1313.956140][T27732] ext4_append+0xd1/0x1c0 [ 1313.960467][T27732] ext4_init_new_dir+0x177/0x500 [ 1313.965416][T27732] ext4_mkdir+0x329/0x760 [ 1313.969740][T27732] vfs_mkdir+0x2c3/0x3e0 [ 1313.973980][T27732] do_mkdirat+0x12e/0x2c0 [ 1313.978316][T27732] __x64_sys_mkdir+0x40/0x50 [ 1313.983065][T27732] do_syscall_64+0x44/0xa0 [ 1313.987538][T27732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1313.993428][T27732] RIP: 0033:0x465707 [ 1313.997322][T27732] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.017344][T27732] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.025833][T27732] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1314.033867][T27732] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.041838][T27732] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.049802][T27732] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.057847][T27732] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1314.071609][T27742] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1314.085149][T27742] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 08:59:26 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ea}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1314.096658][T27742] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002e01, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007a03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1314.129076][T27732] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1314.154716][T27732] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1314.165153][T27732] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1314.215993][T27766] loop2: detected capacity change from 0 to 264192 [ 1314.228398][T27766] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1314.233654][T27770] loop3: detected capacity change from 0 to 264192 [ 1314.239985][T27766] EXT4-fs (loop2): get root inode failed [ 1314.251312][T27770] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1314.252099][T27766] EXT4-fs (loop2): mount failed [ 1314.265926][T27770] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1314.290969][T27770] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e4", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:28 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:28 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:28 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007b03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002f01, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1315.972481][T27800] loop0: detected capacity change from 0 to 264192 [ 1315.974838][T27804] loop3: detected capacity change from 0 to 264192 [ 1315.986300][T27805] loop5: detected capacity change from 0 to 264192 [ 1315.987781][T27806] loop2: detected capacity change from 0 to 264192 [ 1316.007433][T27800] FAULT_INJECTION: forcing a failure. [ 1316.007433][T27800] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.020125][T27800] CPU: 1 PID: 27800 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1316.028899][T27800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.038976][T27800] Call Trace: [ 1316.042440][T27800] dump_stack_lvl+0xd6/0x122 [ 1316.047214][T27800] dump_stack+0x11/0x1b [ 1316.051365][T27800] should_fail+0x23c/0x250 [ 1316.055913][T27800] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 1316.061258][T27800] __should_failslab+0x81/0x90 [ 1316.066039][T27800] should_failslab+0x5/0x20 [ 1316.070535][T27800] kmem_cache_alloc+0x4f/0x300 [ 1316.075300][T27800] ext4_mb_new_blocks+0x73f/0x1fc0 [ 1316.080487][T27800] ? ext4_find_extent+0x6cf/0x7f0 [ 1316.085550][T27800] ? ext4_ext_search_right+0x300/0x540 [ 1316.091001][T27800] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1316.096725][T27800] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1316.102000][T27800] ext4_map_blocks+0x71e/0xf00 [ 1316.106778][T27800] ext4_getblk+0xc6/0x3e0 [ 1316.111140][T27800] ext4_bread+0x28/0x100 [ 1316.115393][T27800] ext4_append+0xd1/0x1c0 [ 1316.119981][T27800] ext4_init_new_dir+0x177/0x500 [ 1316.125195][T27800] ext4_mkdir+0x329/0x760 [ 1316.129624][T27800] vfs_mkdir+0x2c3/0x3e0 [ 1316.133951][T27800] do_mkdirat+0x12e/0x2c0 [ 1316.138360][T27800] __x64_sys_mkdir+0x40/0x50 [ 1316.143009][T27800] do_syscall_64+0x44/0xa0 [ 1316.147421][T27800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1316.153346][T27800] RIP: 0033:0x465707 [ 1316.157250][T27800] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1316.176896][T27800] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1316.185299][T27800] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1316.193262][T27800] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1316.201315][T27800] RBP: 00007f1e348c6040 R08: 0000000000000000 R09: ffffffffffffffff [ 1316.209276][T27800] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1316.217335][T27800] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:28 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x348}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1316.251530][T27806] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1316.263074][T27806] EXT4-fs (loop2): get root inode failed [ 1316.267379][T27805] FAULT_INJECTION: forcing a failure. [ 1316.267379][T27805] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.268789][T27806] EXT4-fs (loop2): mount failed [ 1316.281391][T27805] CPU: 1 PID: 27805 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1316.294957][T27805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.305066][T27805] Call Trace: [ 1316.308342][T27805] dump_stack_lvl+0xd6/0x122 [ 1316.312946][T27805] dump_stack+0x11/0x1b [ 1316.317110][T27805] should_fail+0x23c/0x250 [ 1316.321531][T27805] ? sidtab_sid2str_get+0x9c/0x130 [ 1316.326660][T27805] __should_failslab+0x81/0x90 [ 1316.331444][T27805] should_failslab+0x5/0x20 [ 1316.336040][T27805] __kmalloc_track_caller+0x6d/0x350 [ 1316.341403][T27805] kmemdup+0x21/0x50 [ 1316.345318][T27805] sidtab_sid2str_get+0x9c/0x130 08:59:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14008002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1316.345426][T27804] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1316.350348][T27805] security_sid_to_context_core+0x1cb/0x2d0 [ 1316.369063][T27805] security_sid_to_context_force+0x2f/0x40 [ 1316.374982][T27805] selinux_inode_init_security+0x4e4/0x590 [ 1316.380465][T27804] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1316.380791][T27805] security_inode_init_security+0xe4/0x260 [ 1316.395738][T27805] ? ext4_init_security+0x40/0x40 08:59:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003001, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1316.400771][T27804] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1316.400768][T27805] ext4_init_security+0x30/0x40 [ 1316.400799][T27805] __ext4_new_inode+0x2a0a/0x2fd0 [ 1316.421293][T27805] ext4_mkdir+0x28a/0x760 [ 1316.425745][T27805] vfs_mkdir+0x2c3/0x3e0 [ 1316.429996][T27805] do_mkdirat+0x12e/0x2c0 [ 1316.434348][T27805] __x64_sys_mkdir+0x40/0x50 [ 1316.438946][T27805] do_syscall_64+0x44/0xa0 [ 1316.443372][T27805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1316.449323][T27805] RIP: 0033:0x465707 [ 1316.453201][T27805] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1316.472856][T27805] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1316.481271][T27805] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1316.489224][T27805] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 08:59:28 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1316.497260][T27805] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1316.505210][T27805] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1316.513296][T27805] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:29 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38d}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:29 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1316.583962][T27840] loop0: detected capacity change from 0 to 264192 [ 1316.584154][T27844] loop3: detected capacity change from 0 to 264192 [ 1316.603519][T27844] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1316.606976][T27847] loop2: detected capacity change from 0 to 264192 [ 1316.618006][T27844] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1316.633165][T27844] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1316.643965][T27840] FAULT_INJECTION: forcing a failure. [ 1316.643965][T27840] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.656713][T27840] CPU: 1 PID: 27840 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1316.665491][T27840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.675558][T27840] Call Trace: [ 1316.678842][T27840] dump_stack_lvl+0xd6/0x122 [ 1316.683440][T27840] dump_stack+0x11/0x1b [ 1316.687832][T27840] should_fail+0x23c/0x250 [ 1316.692251][T27840] ? __se_sys_mount+0x4e/0x2f0 [ 1316.697022][T27840] __should_failslab+0x81/0x90 [ 1316.701789][T27840] should_failslab+0x5/0x20 [ 1316.706306][T27840] __kmalloc_track_caller+0x6d/0x350 [ 1316.711591][T27840] ? do_mkdirat+0x293/0x2c0 [ 1316.716181][T27840] ? strnlen_user+0x137/0x1c0 [ 1316.720860][T27840] strndup_user+0x73/0x120 [ 1316.725331][T27840] __se_sys_mount+0x4e/0x2f0 [ 1316.730289][T27840] __x64_sys_mount+0x63/0x70 [ 1316.734882][T27840] do_syscall_64+0x44/0xa0 [ 1316.739375][T27840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1316.745341][T27840] RIP: 0033:0x467b1a [ 1316.749230][T27840] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1316.772268][T27840] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1316.780674][T27840] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1316.788736][T27840] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1316.796696][T27840] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1316.804755][T27840] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1316.813258][T27840] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1316.833739][T27857] loop5: detected capacity change from 0 to 264192 [ 1316.887498][T27847] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1316.897352][T27857] FAULT_INJECTION: forcing a failure. [ 1316.897352][T27857] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.899077][T27847] EXT4-fs (loop2): get root inode failed [ 1316.911705][T27857] CPU: 1 PID: 27857 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1316.917437][T27847] EXT4-fs (loop2): mount failed [ 1316.931255][T27857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.941323][T27857] Call Trace: [ 1316.944615][T27857] dump_stack_lvl+0xd6/0x122 [ 1316.949204][T27857] dump_stack+0x11/0x1b [ 1316.953371][T27857] should_fail+0x23c/0x250 [ 1316.957788][T27857] ? kcalloc+0x32/0x50 [ 1316.961909][T27857] __should_failslab+0x81/0x90 [ 1316.966658][T27857] should_failslab+0x5/0x20 [ 1316.971194][T27857] __kmalloc+0x6f/0x350 [ 1316.975362][T27857] ? __crc32c_le_base+0x250/0x350 [ 1316.980376][T27857] kcalloc+0x32/0x50 [ 1316.984272][T27857] ext4_find_extent+0x21c/0x7f0 [ 1316.989147][T27857] ext4_ext_map_blocks+0x115/0x1ff0 [ 1316.994377][T27857] ? ext4_inode_csum+0x410/0x490 [ 1316.999390][T27857] ? ext4_es_lookup_extent+0x206/0x490 [ 1317.004833][T27857] ext4_map_blocks+0x1cf/0xf00 [ 1317.009677][T27857] ext4_getblk+0xc6/0x3e0 [ 1317.014089][T27857] ext4_bread+0x28/0x100 [ 1317.018326][T27857] ext4_append+0xd1/0x1c0 [ 1317.022685][T27857] ext4_init_new_dir+0x177/0x500 [ 1317.027774][T27857] ext4_mkdir+0x329/0x760 [ 1317.032179][T27857] vfs_mkdir+0x2c3/0x3e0 [ 1317.036418][T27857] do_mkdirat+0x12e/0x2c0 [ 1317.040738][T27857] __x64_sys_mkdir+0x40/0x50 [ 1317.045486][T27857] do_syscall_64+0x44/0xa0 [ 1317.049906][T27857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1317.055791][T27857] RIP: 0033:0x465707 [ 1317.059725][T27857] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1317.079319][T27857] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1317.087721][T27857] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1317.095746][T27857] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1317.103716][T27857] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1317.111685][T27857] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1317.119742][T27857] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1317.153294][T27857] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1317.166375][T27857] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1317.185951][T27857] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:31 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc86", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:31 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003200, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:31 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14008003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:31 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1319.008523][T27890] loop2: detected capacity change from 0 to 264192 [ 1319.016250][T27892] loop3: detected capacity change from 0 to 264192 [ 1319.019706][T27896] loop0: detected capacity change from 0 to 264192 [ 1319.029783][T27891] loop5: detected capacity change from 0 to 264192 [ 1319.038055][T27890] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1319.044142][T27891] FAULT_INJECTION: forcing a failure. [ 1319.044142][T27891] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.049742][T27890] EXT4-fs (loop2): get root inode failed [ 1319.062358][T27891] CPU: 0 PID: 27891 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1319.067977][T27890] EXT4-fs (loop2): mount failed [ 1319.081600][T27891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.091797][T27891] Call Trace: [ 1319.095071][T27891] dump_stack_lvl+0xd6/0x122 [ 1319.099271][T27896] FAULT_INJECTION: forcing a failure. [ 1319.099271][T27896] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.099686][T27891] dump_stack+0x11/0x1b [ 1319.116371][T27891] should_fail+0x23c/0x250 [ 1319.120783][T27891] ? __es_insert_extent+0x51f/0xe70 [ 1319.126007][T27891] __should_failslab+0x81/0x90 [ 1319.130759][T27891] should_failslab+0x5/0x20 [ 1319.135254][T27891] kmem_cache_alloc+0x4f/0x300 [ 1319.140015][T27891] ? __set_page_dirty+0x160/0x1a0 [ 1319.145181][T27891] __es_insert_extent+0x51f/0xe70 [ 1319.150270][T27891] ext4_es_insert_extent+0x1cb/0x1950 [ 1319.155627][T27891] ext4_ext_map_blocks+0x100a/0x1ff0 [ 1319.160899][T27891] ext4_map_blocks+0x1cf/0xf00 [ 1319.165653][T27891] ext4_getblk+0xc6/0x3e0 [ 1319.169972][T27891] ext4_bread+0x28/0x100 [ 1319.174251][T27891] ext4_append+0xd1/0x1c0 [ 1319.178569][T27891] ext4_init_new_dir+0x177/0x500 [ 1319.183494][T27891] ext4_mkdir+0x329/0x760 [ 1319.187810][T27891] vfs_mkdir+0x2c3/0x3e0 [ 1319.192059][T27891] do_mkdirat+0x12e/0x2c0 [ 1319.196429][T27891] __x64_sys_mkdir+0x40/0x50 [ 1319.201056][T27891] do_syscall_64+0x44/0xa0 [ 1319.205501][T27891] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1319.211445][T27891] RIP: 0033:0x465707 [ 1319.215457][T27891] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1319.235051][T27891] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1319.243549][T27891] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1319.251857][T27891] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1319.259993][T27891] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1319.267975][T27891] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1319.275940][T27891] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1319.283899][T27896] CPU: 1 PID: 27896 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1319.292772][T27896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.302904][T27896] Call Trace: [ 1319.306175][T27896] dump_stack_lvl+0xd6/0x122 [ 1319.310842][T27896] dump_stack+0x11/0x1b [ 1319.314987][T27896] should_fail+0x23c/0x250 [ 1319.319392][T27896] ? __se_sys_mount+0x91/0x2f0 [ 1319.324163][T27896] __should_failslab+0x81/0x90 [ 1319.329037][T27896] should_failslab+0x5/0x20 [ 1319.333622][T27896] __kmalloc_track_caller+0x6d/0x350 [ 1319.338925][T27896] ? strnlen_user+0x137/0x1c0 [ 1319.343623][T27896] strndup_user+0x73/0x120 [ 1319.348035][T27896] __se_sys_mount+0x91/0x2f0 [ 1319.352643][T27896] __x64_sys_mount+0x63/0x70 [ 1319.357226][T27896] do_syscall_64+0x44/0xa0 [ 1319.361700][T27896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1319.367780][T27896] RIP: 0033:0x467b1a [ 1319.371669][T27896] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1319.391266][T27896] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1319.399671][T27896] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1319.407720][T27896] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1319.415784][T27896] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1319.423741][T27896] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1319.431788][T27896] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:31 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1319.463530][T27892] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1319.502283][T27892] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 08:59:31 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14008200, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:31 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1319.514387][T27892] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1319.527189][T27891] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1319.564214][T27891] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1319.583632][T27891] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1319.597532][T27928] loop0: detected capacity change from 0 to 264192 [ 1319.604824][T27925] loop2: detected capacity change from 0 to 264192 08:59:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003201, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1319.606870][T27928] FAULT_INJECTION: forcing a failure. [ 1319.606870][T27928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1319.624420][T27928] CPU: 1 PID: 27928 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1319.633183][T27928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.643241][T27928] Call Trace: [ 1319.646557][T27928] dump_stack_lvl+0xd6/0x122 [ 1319.651149][T27928] dump_stack+0x11/0x1b [ 1319.655303][T27928] should_fail+0x23c/0x250 [ 1319.659711][T27928] should_fail_usercopy+0x16/0x20 [ 1319.664841][T27928] _copy_from_user+0x1c/0xd0 [ 1319.669459][T27928] strndup_user+0xb0/0x120 [ 1319.673868][T27928] __se_sys_mount+0x91/0x2f0 [ 1319.678517][T27928] __x64_sys_mount+0x63/0x70 [ 1319.683095][T27928] do_syscall_64+0x44/0xa0 [ 1319.687542][T27928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1319.693595][T27928] RIP: 0033:0x467b1a 08:59:32 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1319.697474][T27928] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1319.717176][T27928] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1319.725654][T27928] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1319.733611][T27928] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1319.741565][T27928] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1319.749521][T27928] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1319.757478][T27928] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1319.843564][T27944] loop0: detected capacity change from 0 to 264192 [ 1319.870174][T27944] FAULT_INJECTION: forcing a failure. [ 1319.870174][T27944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1319.883277][T27944] CPU: 0 PID: 27944 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1319.892191][T27944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.902239][T27944] Call Trace: [ 1319.905542][T27944] dump_stack_lvl+0xd6/0x122 [ 1319.910222][T27944] dump_stack+0x11/0x1b [ 1319.914390][T27944] should_fail+0x23c/0x250 [ 1319.918856][T27944] should_fail_usercopy+0x16/0x20 [ 1319.924777][T27944] _copy_from_user+0x1c/0xd0 [ 1319.929438][T27944] strndup_user+0xb0/0x120 [ 1319.931237][T27949] loop3: detected capacity change from 0 to 264192 [ 1319.933868][T27944] __se_sys_mount+0x91/0x2f0 [ 1319.944955][T27944] __x64_sys_mount+0x63/0x70 [ 1319.949557][T27944] do_syscall_64+0x44/0xa0 [ 1319.954057][T27944] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1319.960082][T27944] RIP: 0033:0x467b1a [ 1319.963975][T27944] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1319.983871][T27944] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1319.992365][T27944] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1320.000328][T27944] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1320.008287][T27944] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1320.016267][T27944] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1320.024278][T27944] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1320.056553][T27949] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1320.069815][T27949] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1320.088255][T27949] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc86", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:34 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:34 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400c002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:34 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14003301, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1322.041228][T27975] loop2: detected capacity change from 0 to 264192 [ 1322.052517][T27976] loop0: detected capacity change from 0 to 264192 [ 1322.075120][T27975] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1322.087368][T27976] FAULT_INJECTION: forcing a failure. [ 1322.087368][T27976] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1322.087690][T27975] EXT4-fs (loop2): get root inode failed [ 1322.100677][T27976] CPU: 1 PID: 27976 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1322.106307][T27975] EXT4-fs (loop2): mount failed [ 1322.115028][T27976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.129896][T27976] Call Trace: [ 1322.130599][T27985] loop5: detected capacity change from 0 to 264192 [ 1322.133194][T27976] dump_stack_lvl+0xd6/0x122 [ 1322.142769][T27985] FAULT_INJECTION: forcing a failure. [ 1322.142769][T27985] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.144510][T27976] dump_stack+0x11/0x1b [ 1322.161551][T27976] should_fail+0x23c/0x250 [ 1322.166132][T27976] should_fail_usercopy+0x16/0x20 [ 1322.171144][T27976] _copy_from_user+0x1c/0xd0 [ 1322.175725][T27976] __se_sys_mount+0x119/0x2f0 [ 1322.180434][T27976] __x64_sys_mount+0x63/0x70 [ 1322.185071][T27976] do_syscall_64+0x44/0xa0 [ 1322.189486][T27976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1322.195432][T27976] RIP: 0033:0x467b1a [ 1322.199316][T27976] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1322.218981][T27976] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1322.227419][T27976] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1322.235906][T27976] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1322.244595][T27976] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1322.252630][T27976] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1322.261098][T27976] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1322.269152][T27985] CPU: 0 PID: 27985 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1322.278005][T27985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.289654][T27985] Call Trace: [ 1322.292940][T27985] dump_stack_lvl+0xd6/0x122 [ 1322.297587][T27985] dump_stack+0x11/0x1b [ 1322.302021][T27985] should_fail+0x23c/0x250 [ 1322.307175][T27985] ? kcalloc+0x32/0x50 [ 1322.311299][T27985] __should_failslab+0x81/0x90 [ 1322.316153][T27985] should_failslab+0x5/0x20 [ 1322.320687][T27985] __kmalloc+0x6f/0x350 [ 1322.325027][T27985] kcalloc+0x32/0x50 [ 1322.329021][T27985] ext4_find_extent+0x21c/0x7f0 [ 1322.333958][T27985] ? kfree+0xf8/0x1d0 [ 1322.337939][T27985] ext4_ext_map_blocks+0x115/0x1ff0 [ 1322.343301][T27985] ext4_map_blocks+0x71e/0xf00 [ 1322.348134][T27985] ext4_getblk+0xc6/0x3e0 [ 1322.352472][T27985] ext4_bread+0x28/0x100 [ 1322.356716][T27985] ext4_append+0xd1/0x1c0 [ 1322.361073][T27985] ext4_init_new_dir+0x177/0x500 [ 1322.366005][T27985] ext4_mkdir+0x329/0x760 [ 1322.370340][T27985] vfs_mkdir+0x2c3/0x3e0 [ 1322.374619][T27985] do_mkdirat+0x12e/0x2c0 [ 1322.379118][T27985] __x64_sys_mkdir+0x40/0x50 [ 1322.383829][T27985] do_syscall_64+0x44/0xa0 [ 1322.388246][T27985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1322.394135][T27985] RIP: 0033:0x465707 [ 1322.398022][T27985] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1322.417799][T27985] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1322.426424][T27985] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1322.434386][T27985] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1322.442347][T27985] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1322.450329][T27985] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1322.458326][T27985] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1322.476471][T27987] loop3: detected capacity change from 0 to 264192 08:59:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc86", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1322.485284][T27976] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1322.511772][T27976] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 08:59:34 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1322.545885][T27976] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1322.575329][T28007] loop5: detected capacity change from 0 to 264192 [ 1322.586385][T28007] FAULT_INJECTION: forcing a failure. 08:59:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400c003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:35 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1322.586385][T28007] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.599414][T28007] CPU: 0 PID: 28007 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1322.608274][T28007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.618503][T28007] Call Trace: [ 1322.621782][T28007] dump_stack_lvl+0xd6/0x122 [ 1322.626387][T28007] dump_stack+0x11/0x1b [ 1322.630594][T28007] should_fail+0x23c/0x250 [ 1322.635234][T28007] ? ext4_mb_new_blocks+0x317/0x1fc0 [ 1322.640877][T28007] __should_failslab+0x81/0x90 [ 1322.645925][T28007] should_failslab+0x5/0x20 [ 1322.650583][T28007] kmem_cache_alloc+0x4f/0x300 [ 1322.655357][T28007] ext4_mb_new_blocks+0x317/0x1fc0 [ 1322.660923][T28007] ? ext4_find_extent+0x6cf/0x7f0 [ 1322.666058][T28007] ? ext4_ext_search_right+0x300/0x540 [ 1322.671067][T28018] loop2: detected capacity change from 0 to 264192 [ 1322.671694][T28007] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1322.684068][T28007] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1322.689367][T28007] ext4_map_blocks+0x71e/0xf00 [ 1322.694149][T28007] ext4_getblk+0xc6/0x3e0 [ 1322.698636][T28007] ext4_bread+0x28/0x100 [ 1322.702992][T28007] ext4_append+0xd1/0x1c0 [ 1322.707331][T28007] ext4_init_new_dir+0x177/0x500 [ 1322.712275][T28007] ext4_mkdir+0x329/0x760 [ 1322.716651][T28007] vfs_mkdir+0x2c3/0x3e0 [ 1322.720914][T28007] do_mkdirat+0x12e/0x2c0 [ 1322.725264][T28007] __x64_sys_mkdir+0x40/0x50 [ 1322.729861][T28007] do_syscall_64+0x44/0xa0 [ 1322.734287][T28007] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1322.740222][T28007] RIP: 0033:0x465707 [ 1322.744172][T28007] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1322.764565][T28007] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1322.773181][T28007] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1322.781164][T28007] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1322.785820][T28027] loop3: detected capacity change from 0 to 264192 [ 1322.789308][T28007] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1322.789327][T28007] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1322.789339][T28007] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1322.798910][T28018] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1322.825279][T28027] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature 08:59:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004001, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1322.832088][T28018] EXT4-fs (loop2): get root inode failed [ 1322.845198][T28027] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1322.850851][T28018] EXT4-fs (loop2): mount failed [ 1322.862698][T28027] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:35 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400fa03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1322.953057][T28047] loop0: detected capacity change from 0 to 264192 [ 1322.976042][T28049] loop5: detected capacity change from 0 to 264192 [ 1322.986749][T28047] FAULT_INJECTION: forcing a failure. [ 1322.986749][T28047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1322.999910][T28047] CPU: 1 PID: 28047 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1323.001787][T28049] FAULT_INJECTION: forcing a failure. [ 1323.001787][T28049] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.009016][T28047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.009030][T28047] Call Trace: [ 1323.009038][T28047] dump_stack_lvl+0xd6/0x122 [ 1323.009064][T28047] dump_stack+0x11/0x1b [ 1323.043772][T28047] should_fail+0x23c/0x250 [ 1323.048179][T28047] should_fail_usercopy+0x16/0x20 [ 1323.053196][T28047] _copy_from_user+0x1c/0xd0 [ 1323.057938][T28047] __se_sys_mount+0x119/0x2f0 [ 1323.062606][T28047] __x64_sys_mount+0x63/0x70 [ 1323.067185][T28047] do_syscall_64+0x44/0xa0 [ 1323.071710][T28047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1323.077651][T28047] RIP: 0033:0x467b1a [ 1323.081533][T28047] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1323.101210][T28047] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1323.109751][T28047] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1323.117705][T28047] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1323.125991][T28047] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1323.134036][T28047] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1323.141991][T28047] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:35 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1323.150041][T28049] CPU: 0 PID: 28049 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1323.159203][T28049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.167568][T28059] loop3: detected capacity change from 0 to 264192 [ 1323.169515][T28049] Call Trace: [ 1323.169524][T28049] dump_stack_lvl+0xd6/0x122 [ 1323.184462][T28049] dump_stack+0x11/0x1b [ 1323.188722][T28049] should_fail+0x23c/0x250 [ 1323.193143][T28049] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 1323.198435][T28049] __should_failslab+0x81/0x90 [ 1323.203232][T28049] should_failslab+0x5/0x20 [ 1323.205599][T28057] loop2: detected capacity change from 0 to 264192 [ 1323.207759][T28049] kmem_cache_alloc+0x4f/0x300 [ 1323.207783][T28049] ext4_mb_new_blocks+0x73f/0x1fc0 [ 1323.207802][T28049] ? ext4_find_extent+0x6cf/0x7f0 [ 1323.207826][T28049] ? ext4_ext_search_right+0x300/0x540 [ 1323.234784][T28049] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1323.238537][T28057] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1323.240539][T28049] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1323.252107][T28057] EXT4-fs (loop2): get root inode failed [ 1323.257345][T28049] ext4_map_blocks+0x71e/0xf00 [ 1323.257375][T28049] ext4_getblk+0xc6/0x3e0 [ 1323.262983][T28057] EXT4-fs (loop2): mount failed [ 1323.267714][T28049] ext4_bread+0x28/0x100 [ 1323.281101][T28049] ext4_append+0xd1/0x1c0 [ 1323.285437][T28049] ext4_init_new_dir+0x177/0x500 [ 1323.290392][T28049] ext4_mkdir+0x329/0x760 [ 1323.294766][T28049] vfs_mkdir+0x2c3/0x3e0 [ 1323.299034][T28049] do_mkdirat+0x12e/0x2c0 [ 1323.303479][T28049] __x64_sys_mkdir+0x40/0x50 [ 1323.308086][T28049] do_syscall_64+0x44/0xa0 [ 1323.312522][T28049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1323.318522][T28049] RIP: 0033:0x465707 [ 1323.322416][T28049] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1323.342025][T28049] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1323.350448][T28049] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1323.358462][T28049] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1323.366636][T28049] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1323.374621][T28049] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1323.382630][T28049] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:35 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1323.392256][T28059] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1323.405448][T28047] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1323.439845][T28059] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1323.449194][T28047] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1323.470333][T28047] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1323.481356][T28059] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1323.497745][T28081] loop5: detected capacity change from 0 to 264192 [ 1323.506119][T28081] FAULT_INJECTION: forcing a failure. [ 1323.506119][T28081] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.518807][T28081] CPU: 0 PID: 28081 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1323.527579][T28081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.537640][T28081] Call Trace: [ 1323.540927][T28081] dump_stack_lvl+0xd6/0x122 [ 1323.545679][T28081] dump_stack+0x11/0x1b [ 1323.549847][T28081] should_fail+0x23c/0x250 [ 1323.554272][T28081] ? __es_insert_extent+0x51f/0xe70 [ 1323.559541][T28081] __should_failslab+0x81/0x90 [ 1323.564403][T28081] should_failslab+0x5/0x20 [ 1323.569090][T28081] kmem_cache_alloc+0x4f/0x300 [ 1323.573991][T28081] __es_insert_extent+0x51f/0xe70 [ 1323.579060][T28081] ext4_es_insert_extent+0x1cb/0x1950 [ 1323.584435][T28081] ext4_map_blocks+0xa5d/0xf00 [ 1323.589218][T28081] ext4_getblk+0xc6/0x3e0 [ 1323.593570][T28081] ext4_bread+0x28/0x100 [ 1323.597822][T28081] ext4_append+0xd1/0x1c0 [ 1323.602613][T28081] ext4_init_new_dir+0x177/0x500 [ 1323.608043][T28081] ext4_mkdir+0x329/0x760 [ 1323.612523][T28081] vfs_mkdir+0x2c3/0x3e0 [ 1323.616847][T28081] do_mkdirat+0x12e/0x2c0 [ 1323.621387][T28081] __x64_sys_mkdir+0x40/0x50 [ 1323.625969][T28081] do_syscall_64+0x44/0xa0 [ 1323.630466][T28081] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1323.636620][T28081] RIP: 0033:0x465707 [ 1323.640852][T28081] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1323.660564][T28081] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1323.669132][T28081] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1323.677085][T28081] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1323.685043][T28081] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1323.693004][T28081] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1323.700953][T28081] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1323.715587][T28081] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1323.728546][T28081] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1323.742574][T28081] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc8624", 0x2e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400fb03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:37 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:37 executing program 0 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:37 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1325.582769][T28109] loop5: detected capacity change from 0 to 264192 [ 1325.584876][T28110] loop3: detected capacity change from 0 to 264192 [ 1325.601877][T28117] loop0: detected capacity change from 0 to 264192 [ 1325.603221][T28116] loop2: detected capacity change from 0 to 264192 [ 1325.615032][T28117] FAULT_INJECTION: forcing a failure. [ 1325.615032][T28117] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1325.628582][T28117] CPU: 0 PID: 28117 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1325.637354][T28117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.646546][T28109] FAULT_INJECTION: forcing a failure. [ 1325.646546][T28109] name failslab, interval 1, probability 0, space 0, times 0 [ 1325.647551][T28117] Call Trace: [ 1325.647561][T28117] dump_stack_lvl+0xd6/0x122 [ 1325.668314][T28117] dump_stack+0x11/0x1b [ 1325.672662][T28117] should_fail+0x23c/0x250 [ 1325.677098][T28117] should_fail_usercopy+0x16/0x20 [ 1325.682115][T28117] strncpy_from_user+0x21/0x250 [ 1325.686988][T28117] getname_flags+0xb8/0x3f0 [ 1325.692180][T28117] ? should_fail+0xd6/0x250 [ 1325.696824][T28117] user_path_at_empty+0x28/0x110 [ 1325.701974][T28117] __se_sys_mount+0x217/0x2f0 [ 1325.706732][T28117] __x64_sys_mount+0x63/0x70 [ 1325.711651][T28117] do_syscall_64+0x44/0xa0 [ 1325.716078][T28117] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1325.722443][T28117] RIP: 0033:0x467b1a [ 1325.726334][T28117] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1325.745934][T28117] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1325.754344][T28117] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1325.762304][T28117] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1325.770275][T28117] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1325.778342][T28117] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1325.786354][T28117] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1325.794427][T28109] CPU: 1 PID: 28109 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1325.803458][T28109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.813607][T28109] Call Trace: [ 1325.816895][T28109] dump_stack_lvl+0xd6/0x122 [ 1325.821580][T28109] dump_stack+0x11/0x1b [ 1325.825731][T28109] should_fail+0x23c/0x250 [ 1325.830136][T28109] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 1325.835607][T28109] __should_failslab+0x81/0x90 [ 1325.840589][T28109] should_failslab+0x5/0x20 [ 1325.845233][T28109] kmem_cache_alloc+0x4f/0x300 [ 1325.850084][T28109] ext4_mb_new_blocks+0x73f/0x1fc0 [ 1325.855271][T28109] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1325.860989][T28109] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1325.866347][T28109] ext4_map_blocks+0x71e/0xf00 [ 1325.871165][T28109] ext4_getblk+0xc6/0x3e0 [ 1325.875590][T28109] ext4_bread+0x28/0x100 [ 1325.879831][T28109] ext4_append+0xd1/0x1c0 [ 1325.884585][T28109] ext4_init_new_dir+0x177/0x500 [ 1325.889568][T28109] ext4_mkdir+0x329/0x760 [ 1325.893884][T28109] vfs_mkdir+0x2c3/0x3e0 [ 1325.898186][T28109] do_mkdirat+0x12e/0x2c0 [ 1325.902535][T28109] __x64_sys_mkdir+0x40/0x50 [ 1325.907141][T28109] do_syscall_64+0x44/0xa0 [ 1325.911651][T28109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1325.917609][T28109] RIP: 0033:0x465707 [ 1325.921487][T28109] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1325.941601][T28109] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1325.950066][T28109] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000465707 [ 1325.958021][T28109] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1325.966013][T28109] RBP: 00007f28bfd51040 R08: 0000000000000000 R09: ffffffffffffffff [ 1325.973976][T28109] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 08:59:38 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1325.981939][T28109] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:38 executing program 0 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:38 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:38 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1326.079662][T28146] loop0: detected capacity change from 0 to 264192 [ 1326.119122][T28146] FAULT_INJECTION: forcing a failure. [ 1326.119122][T28146] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.131770][T28146] CPU: 0 PID: 28146 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1326.140528][T28146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.150576][T28146] Call Trace: [ 1326.153848][T28146] dump_stack_lvl+0xd6/0x122 [ 1326.158516][T28146] dump_stack+0x11/0x1b [ 1326.162675][T28146] should_fail+0x23c/0x250 [ 1326.167107][T28146] __should_failslab+0x81/0x90 [ 1326.171870][T28146] ? alloc_fs_context+0x46/0x500 [ 1326.176857][T28146] should_failslab+0x5/0x20 [ 1326.181359][T28146] kmem_cache_alloc_trace+0x52/0x320 [ 1326.186639][T28146] alloc_fs_context+0x46/0x500 [ 1326.191398][T28146] ? strncmp+0x34/0x70 [ 1326.195465][T28146] fs_context_for_mount+0x1d/0x20 [ 1326.200640][T28146] path_mount+0xe0d/0x1d20 [ 1326.205047][T28146] __se_sys_mount+0x24b/0x2f0 [ 1326.209720][T28146] __x64_sys_mount+0x63/0x70 [ 1326.214438][T28146] do_syscall_64+0x44/0xa0 [ 1326.218860][T28146] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1326.224756][T28146] RIP: 0033:0x467b1a [ 1326.228634][T28146] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1326.248337][T28146] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1326.256786][T28146] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1326.265272][T28146] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 08:59:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400fc03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1326.273404][T28146] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1326.281381][T28146] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1326.289336][T28146] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1326.304357][T28156] loop2: detected capacity change from 0 to 264192 [ 1326.315347][T28154] loop5: detected capacity change from 0 to 264192 [ 1326.323233][T28162] loop3: detected capacity change from 0 to 264192 [ 1326.351280][T28154] FAULT_INJECTION: forcing a failure. [ 1326.351280][T28154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1326.357024][T28156] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1326.364819][T28154] CPU: 1 PID: 28154 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1326.376361][T28156] EXT4-fs (loop2): get root inode failed [ 1326.385033][T28154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.390688][T28156] EXT4-fs (loop2): mount failed [ 1326.400846][T28154] Call Trace: [ 1326.400854][T28154] dump_stack_lvl+0xd6/0x122 [ 1326.413902][T28154] dump_stack+0x11/0x1b [ 1326.418073][T28154] should_fail+0x23c/0x250 [ 1326.422492][T28154] should_fail_usercopy+0x16/0x20 [ 1326.427536][T28154] _copy_from_user+0x1c/0xd0 [ 1326.432398][T28154] strndup_user+0xb0/0x120 [ 1326.436826][T28154] __se_sys_mount+0x4e/0x2f0 [ 1326.441428][T28154] __x64_sys_mount+0x63/0x70 [ 1326.446070][T28154] do_syscall_64+0x44/0xa0 [ 1326.450510][T28154] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1326.456534][T28154] RIP: 0033:0x467b1a [ 1326.460426][T28154] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1326.480226][T28154] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1326.488810][T28154] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1326.496770][T28154] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1326.504746][T28154] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1326.512788][T28154] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1326.520757][T28154] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400fd03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:40 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc8624", 0x2e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:40 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004201, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:40 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:40 executing program 0 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1328.586189][T28190] loop0: detected capacity change from 0 to 264192 [ 1328.597095][T28190] FAULT_INJECTION: forcing a failure. [ 1328.597095][T28190] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.598129][T28191] loop3: detected capacity change from 0 to 264192 [ 1328.609953][T28190] CPU: 1 PID: 28190 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1328.619459][T28194] loop5: detected capacity change from 0 to 264192 [ 1328.626228][T28190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.626242][T28190] Call Trace: [ 1328.626250][T28190] dump_stack_lvl+0xd6/0x122 [ 1328.649399][T28194] FAULT_INJECTION: forcing a failure. [ 1328.649399][T28194] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.653359][T28190] dump_stack+0x11/0x1b [ 1328.670115][T28190] should_fail+0x23c/0x250 [ 1328.674551][T28190] ? getname_flags+0x84/0x3f0 [ 1328.679240][T28190] __should_failslab+0x81/0x90 [ 1328.684003][T28190] should_failslab+0x5/0x20 [ 1328.688501][T28190] kmem_cache_alloc+0x4f/0x300 [ 1328.693339][T28190] ? should_fail+0xd6/0x250 [ 1328.698100][T28190] getname_flags+0x84/0x3f0 [ 1328.702740][T28190] ? should_fail+0xd6/0x250 [ 1328.707230][T28190] user_path_at_empty+0x28/0x110 [ 1328.712253][T28190] __se_sys_mount+0x217/0x2f0 [ 1328.716921][T28190] __x64_sys_mount+0x63/0x70 [ 1328.721594][T28190] do_syscall_64+0x44/0xa0 [ 1328.726006][T28190] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1328.731895][T28190] RIP: 0033:0x467b1a [ 1328.735792][T28190] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.755766][T28190] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1328.764165][T28190] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1328.772487][T28190] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1328.781921][T28190] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1328.789885][T28190] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1328.798028][T28190] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1328.805993][T28194] CPU: 0 PID: 28194 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1328.814975][T28194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.818570][T28201] loop2: detected capacity change from 0 to 264192 [ 1328.825466][T28194] Call Trace: [ 1328.825476][T28194] dump_stack_lvl+0xd6/0x122 [ 1328.825503][T28194] dump_stack+0x11/0x1b [ 1328.844053][T28194] should_fail+0x23c/0x250 [ 1328.848470][T28194] ? __se_sys_mount+0x91/0x2f0 [ 1328.853367][T28194] __should_failslab+0x81/0x90 [ 1328.858268][T28194] should_failslab+0x5/0x20 [ 1328.863016][T28194] __kmalloc_track_caller+0x6d/0x350 [ 1328.868309][T28194] ? strnlen_user+0x137/0x1c0 [ 1328.873036][T28194] strndup_user+0x73/0x120 [ 1328.877460][T28194] __se_sys_mount+0x91/0x2f0 [ 1328.882182][T28194] __x64_sys_mount+0x63/0x70 [ 1328.886998][T28194] do_syscall_64+0x44/0xa0 [ 1328.891422][T28194] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1328.897584][T28194] RIP: 0033:0x467b1a [ 1328.901481][T28194] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.921171][T28194] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1328.929636][T28194] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a 08:59:41 executing program 0 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1328.937605][T28194] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1328.945579][T28194] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1328.953661][T28194] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1328.961714][T28194] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1328.988907][T28191] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1328.990070][T28201] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1329.013574][T28201] EXT4-fs (loop2): get root inode failed [ 1329.017046][T28191] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1329.019240][T28201] EXT4-fs (loop2): mount failed 08:59:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:41 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1329.037911][T28191] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1329.066156][T28216] loop0: detected capacity change from 0 to 264192 08:59:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004301, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1329.095009][T28216] FAULT_INJECTION: forcing a failure. [ 1329.095009][T28216] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.107701][T28216] CPU: 0 PID: 28216 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1329.116512][T28216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.126563][T28216] Call Trace: [ 1329.129838][T28216] dump_stack_lvl+0xd6/0x122 [ 1329.134499][T28216] dump_stack+0x11/0x1b [ 1329.138657][T28216] should_fail+0x23c/0x250 [ 1329.143116][T28216] ? vfs_parse_fs_string+0x6d/0xd0 [ 1329.148268][T28216] __should_failslab+0x81/0x90 [ 1329.153138][T28216] should_failslab+0x5/0x20 [ 1329.157952][T28216] __kmalloc_track_caller+0x6d/0x350 [ 1329.163265][T28216] kmemdup_nul+0x27/0x70 [ 1329.167547][T28216] vfs_parse_fs_string+0x6d/0xd0 [ 1329.172585][T28216] path_mount+0xfb1/0x1d20 [ 1329.176999][T28216] __se_sys_mount+0x24b/0x2f0 [ 1329.181680][T28216] __x64_sys_mount+0x63/0x70 [ 1329.186260][T28216] do_syscall_64+0x44/0xa0 [ 1329.190695][T28216] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1329.196578][T28216] RIP: 0033:0x467b1a [ 1329.200463][T28216] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.221009][T28216] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1329.229480][T28216] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1329.237438][T28216] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1329.245395][T28216] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1329.253353][T28216] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1329.261397][T28216] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400feff, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:41 executing program 0 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1329.295491][T28235] loop5: detected capacity change from 0 to 264192 [ 1329.305450][T28235] FAULT_INJECTION: forcing a failure. [ 1329.305450][T28235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.318647][T28235] CPU: 1 PID: 28235 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1329.327466][T28235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.337369][T28240] loop2: detected capacity change from 0 to 264192 [ 1329.337622][T28235] Call Trace: [ 1329.337631][T28235] dump_stack_lvl+0xd6/0x122 [ 1329.352028][T28235] dump_stack+0x11/0x1b [ 1329.356205][T28235] should_fail+0x23c/0x250 [ 1329.360621][T28235] should_fail_usercopy+0x16/0x20 [ 1329.365916][T28235] _copy_from_user+0x1c/0xd0 [ 1329.370522][T28235] strndup_user+0xb0/0x120 [ 1329.375314][T28235] __se_sys_mount+0x91/0x2f0 [ 1329.380169][T28235] ? do_mkdirat+0x293/0x2c0 [ 1329.384754][T28235] __x64_sys_mount+0x63/0x70 [ 1329.389343][T28235] do_syscall_64+0x44/0xa0 [ 1329.393758][T28235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1329.399648][T28235] RIP: 0033:0x467b1a [ 1329.403531][T28235] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.423126][T28235] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1329.431532][T28235] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1329.439708][T28235] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1329.447766][T28235] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1329.455820][T28235] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1329.464305][T28235] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:41 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1401}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1329.495584][T28248] loop3: detected capacity change from 0 to 264192 [ 1329.516132][T28247] loop0: detected capacity change from 0 to 264192 [ 1329.526919][T28247] FAULT_INJECTION: forcing a failure. [ 1329.526919][T28247] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.539584][T28247] CPU: 1 PID: 28247 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1329.548435][T28247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.558567][T28247] Call Trace: [ 1329.561845][T28247] dump_stack_lvl+0xd6/0x122 [ 1329.566761][T28247] dump_stack+0x11/0x1b [ 1329.570923][T28247] should_fail+0x23c/0x250 [ 1329.575498][T28247] ? ext4_mount+0x40/0x40 [ 1329.579816][T28247] ? getname_kernel+0x37/0x1d0 [ 1329.584579][T28247] __should_failslab+0x81/0x90 [ 1329.589448][T28247] should_failslab+0x5/0x20 [ 1329.593998][T28247] kmem_cache_alloc+0x4f/0x300 [ 1329.598839][T28247] ? avc_has_perm_noaudit+0x1c0/0x270 [ 1329.604334][T28247] ? ext4_mount+0x40/0x40 [ 1329.608658][T28247] getname_kernel+0x37/0x1d0 [ 1329.613508][T28247] ? ext4_mount+0x40/0x40 [ 1329.617827][T28247] kern_path+0x1d/0x100 [ 1329.621986][T28247] ? ext4_mount+0x40/0x40 [ 1329.626313][T28247] blkdev_get_by_path+0x63/0x1c0 [ 1329.631361][T28247] mount_bdev+0x47/0x290 [ 1329.635605][T28247] ? ext4_errno_to_code+0x110/0x110 [ 1329.640856][T28247] ext4_mount+0x2d/0x40 [ 1329.645159][T28247] legacy_get_tree+0x70/0xc0 [ 1329.649765][T28247] vfs_get_tree+0x4a/0x1a0 [ 1329.654182][T28247] path_mount+0x11ec/0x1d20 [ 1329.658763][T28247] __se_sys_mount+0x24b/0x2f0 [ 1329.663431][T28247] __x64_sys_mount+0x63/0x70 [ 1329.668194][T28247] do_syscall_64+0x44/0xa0 [ 1329.672644][T28247] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1329.678989][T28247] RIP: 0033:0x467b1a [ 1329.683334][T28247] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.703099][T28247] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1329.711770][T28247] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1329.719812][T28247] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1329.727858][T28247] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1329.735929][T28247] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1329.744065][T28247] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1329.763369][T28240] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1329.765806][T28248] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1329.774911][T28240] EXT4-fs (loop2): get root inode failed [ 1329.788236][T28248] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1329.793760][T28240] EXT4-fs (loop2): mount failed [ 1329.809002][T28248] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:44 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc8624", 0x2e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:44 executing program 0 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d02}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:44 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14004e00, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400ff01, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1331.610014][T28280] loop2: detected capacity change from 0 to 264192 [ 1331.623856][T28280] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1331.634667][T28294] loop5: detected capacity change from 0 to 264192 [ 1331.635484][T28280] EXT4-fs (loop2): get root inode failed [ 1331.645429][T28294] FAULT_INJECTION: forcing a failure. [ 1331.645429][T28294] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.647707][T28280] EXT4-fs (loop2): mount failed [ 1331.650412][T28290] loop0: detected capacity change from 0 to 264192 [ 1331.660313][T28294] CPU: 0 PID: 28294 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1331.667948][T28290] FAULT_INJECTION: forcing a failure. [ 1331.667948][T28290] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.671673][T28294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.671688][T28294] Call Trace: [ 1331.671695][T28294] dump_stack_lvl+0xd6/0x122 [ 1331.713344][T28294] dump_stack+0x11/0x1b [ 1331.717496][T28294] should_fail+0x23c/0x250 [ 1331.721902][T28294] __should_failslab+0x81/0x90 [ 1331.726653][T28294] ? __se_sys_mount+0xf7/0x2f0 [ 1331.731474][T28294] should_failslab+0x5/0x20 [ 1331.735966][T28294] kmem_cache_alloc_trace+0x52/0x320 [ 1331.741242][T28294] ? _copy_from_user+0x94/0xd0 [ 1331.745997][T28294] __se_sys_mount+0xf7/0x2f0 [ 1331.750582][T28294] __x64_sys_mount+0x63/0x70 [ 1331.755163][T28294] do_syscall_64+0x44/0xa0 [ 1331.759640][T28294] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1331.765819][T28294] RIP: 0033:0x467b1a [ 1331.769748][T28294] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1331.789603][T28294] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1331.798102][T28294] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1331.806063][T28294] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1331.814021][T28294] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1331.822245][T28294] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1331.830559][T28294] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1331.838620][T28290] CPU: 1 PID: 28290 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1331.847386][T28290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.858130][T28290] Call Trace: [ 1331.861496][T28290] dump_stack_lvl+0xd6/0x122 [ 1331.866091][T28290] dump_stack+0x11/0x1b [ 1331.870245][T28290] should_fail+0x23c/0x250 [ 1331.874704][T28290] __should_failslab+0x81/0x90 [ 1331.879461][T28290] ? alloc_super+0x3a/0x520 [ 1331.883957][T28290] should_failslab+0x5/0x20 [ 1331.888449][T28290] kmem_cache_alloc_trace+0x52/0x320 [ 1331.893749][T28290] ? disk_unblock_events+0x35/0x40 [ 1331.899184][T28290] ? mount_bdev+0x290/0x290 [ 1331.903679][T28290] alloc_super+0x3a/0x520 [ 1331.908018][T28290] ? mount_bdev+0x290/0x290 [ 1331.912505][T28290] sget+0x1a5/0x400 [ 1331.916337][T28290] ? test_bdev_super+0x30/0x30 [ 1331.921085][T28290] mount_bdev+0xd3/0x290 [ 1331.925487][T28290] ? ext4_mount+0x40/0x40 [ 1331.929896][T28290] ? ext4_errno_to_code+0x110/0x110 [ 1331.935251][T28290] ext4_mount+0x2d/0x40 [ 1331.939392][T28290] legacy_get_tree+0x70/0xc0 [ 1331.943983][T28290] vfs_get_tree+0x4a/0x1a0 [ 1331.948407][T28290] path_mount+0x11ec/0x1d20 [ 1331.952927][T28290] __se_sys_mount+0x24b/0x2f0 [ 1331.957711][T28290] __x64_sys_mount+0x63/0x70 [ 1331.962328][T28290] do_syscall_64+0x44/0xa0 [ 1331.967201][T28290] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1331.973132][T28290] RIP: 0033:0x467b1a [ 1331.977021][T28290] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1331.996753][T28290] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1332.005155][T28290] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1332.013110][T28290] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1332.025267][T28290] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1332.033403][T28290] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1332.041363][T28290] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:44 executing program 0 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:44 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1332.065500][T28292] loop3: detected capacity change from 0 to 264192 [ 1332.099752][T28292] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature 08:59:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1332.121401][T28292] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1332.137186][T28306] loop0: detected capacity change from 0 to 264192 [ 1332.144697][T28292] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1332.176112][T28306] FAULT_INJECTION: forcing a failure. [ 1332.176112][T28306] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.188706][T28318] loop5: detected capacity change from 0 to 264192 [ 1332.190880][T28318] FAULT_INJECTION: forcing a failure. [ 1332.190880][T28318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1332.195323][T28306] CPU: 1 PID: 28306 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1332.195348][T28306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.227113][T28306] Call Trace: [ 1332.230414][T28306] dump_stack_lvl+0xd6/0x122 [ 1332.235008][T28306] dump_stack+0x11/0x1b [ 1332.239221][T28306] should_fail+0x23c/0x250 [ 1332.243623][T28306] ? kzalloc+0x1d/0x30 [ 1332.247677][T28306] __should_failslab+0x81/0x90 [ 1332.252440][T28306] should_failslab+0x5/0x20 [ 1332.256932][T28306] __kmalloc+0x6f/0x350 [ 1332.261203][T28306] kzalloc+0x1d/0x30 [ 1332.265089][T28306] security_sb_alloc+0x3c/0x180 [ 1332.269971][T28306] alloc_super+0x10b/0x520 [ 1332.274444][T28306] ? mount_bdev+0x290/0x290 [ 1332.278989][T28306] sget+0x1a5/0x400 [ 1332.282874][T28306] ? test_bdev_super+0x30/0x30 [ 1332.287709][T28306] mount_bdev+0xd3/0x290 [ 1332.291937][T28306] ? ext4_mount+0x40/0x40 [ 1332.296253][T28306] ? ext4_errno_to_code+0x110/0x110 [ 1332.301607][T28306] ext4_mount+0x2d/0x40 [ 1332.305918][T28306] legacy_get_tree+0x70/0xc0 [ 1332.310497][T28306] vfs_get_tree+0x4a/0x1a0 [ 1332.314899][T28306] path_mount+0x11ec/0x1d20 [ 1332.319423][T28306] __se_sys_mount+0x24b/0x2f0 [ 1332.324278][T28306] __x64_sys_mount+0x63/0x70 [ 1332.328864][T28306] do_syscall_64+0x44/0xa0 [ 1332.333325][T28306] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1332.339296][T28306] RIP: 0033:0x467b1a [ 1332.343253][T28306] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1332.362860][T28306] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1332.371267][T28306] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1332.379231][T28306] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1332.387214][T28306] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1332.395177][T28306] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1332.403267][T28306] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1332.411240][T28318] CPU: 0 PID: 28318 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1332.420095][T28318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.430409][T28318] Call Trace: [ 1332.433697][T28318] dump_stack_lvl+0xd6/0x122 [ 1332.438304][T28318] dump_stack+0x11/0x1b [ 1332.442467][T28318] should_fail+0x23c/0x250 [ 1332.446884][T28318] should_fail_usercopy+0x16/0x20 [ 1332.451902][T28318] _copy_from_user+0x1c/0xd0 [ 1332.456591][T28318] __se_sys_mount+0x119/0x2f0 [ 1332.461262][T28318] __x64_sys_mount+0x63/0x70 [ 1332.465907][T28318] do_syscall_64+0x44/0xa0 [ 1332.470318][T28318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1332.476249][T28318] RIP: 0033:0x467b1a [ 1332.480139][T28318] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1332.499778][T28318] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1332.508432][T28318] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1332.516388][T28318] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 08:59:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400ff0f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:44 executing program 0 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1332.524344][T28318] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1332.532386][T28318] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1332.540343][T28318] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:45 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1332.590055][T28327] loop2: detected capacity change from 0 to 264192 [ 1332.633327][T28327] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1332.644957][T28327] EXT4-fs (loop2): get root inode failed [ 1332.650663][T28327] EXT4-fs (loop2): mount failed [ 1332.669755][T28318] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1332.681265][T28339] loop0: detected capacity change from 0 to 264192 [ 1332.692520][T28339] FAULT_INJECTION: forcing a failure. [ 1332.692520][T28339] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.705263][T28339] CPU: 0 PID: 28339 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1332.714042][T28339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.724328][T28339] Call Trace: [ 1332.727657][T28339] dump_stack_lvl+0xd6/0x122 [ 1332.731505][T28318] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1332.732729][T28339] dump_stack+0x11/0x1b [ 1332.732755][T28339] should_fail+0x23c/0x250 [ 1332.750413][T28339] ? __list_lru_init+0x70/0x680 [ 1332.755281][T28339] __should_failslab+0x81/0x90 [ 1332.760275][T28318] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1332.760315][T28339] should_failslab+0x5/0x20 [ 1332.775607][T28339] __kmalloc+0x6f/0x350 [ 1332.779802][T28339] ? prealloc_memcg_shrinker+0x444/0x460 [ 1332.785456][T28339] __list_lru_init+0x70/0x680 [ 1332.790230][T28339] alloc_super+0x490/0x520 [ 1332.794666][T28339] ? mount_bdev+0x290/0x290 [ 1332.799178][T28339] sget+0x1a5/0x400 [ 1332.802988][T28339] ? test_bdev_super+0x30/0x30 [ 1332.807771][T28339] mount_bdev+0xd3/0x290 [ 1332.812019][T28339] ? ext4_mount+0x40/0x40 [ 1332.816349][T28339] ? ext4_errno_to_code+0x110/0x110 [ 1332.821668][T28339] ext4_mount+0x2d/0x40 [ 1332.825829][T28339] legacy_get_tree+0x70/0xc0 [ 1332.830611][T28339] vfs_get_tree+0x4a/0x1a0 [ 1332.835125][T28339] path_mount+0x11ec/0x1d20 [ 1332.839780][T28339] __se_sys_mount+0x24b/0x2f0 [ 1332.844478][T28339] __x64_sys_mount+0x63/0x70 [ 1332.849083][T28339] do_syscall_64+0x44/0xa0 [ 1332.853506][T28339] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1332.860539][T28339] RIP: 0033:0x467b1a [ 1332.864480][T28339] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1332.884154][T28339] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1332.892568][T28339] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1332.900635][T28339] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1332.908595][T28339] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1332.916756][T28339] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1332.924819][T28339] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14005603, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:47 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:47 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:47 executing program 0 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400fffe, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1334.634693][T28370] loop3: detected capacity change from 0 to 264192 [ 1334.644584][T28374] loop0: detected capacity change from 0 to 264192 [ 1334.646261][T28375] loop5: detected capacity change from 0 to 264192 [ 1334.659541][T28377] loop2: detected capacity change from 0 to 264192 [ 1334.674369][T28374] FAULT_INJECTION: forcing a failure. [ 1334.674369][T28374] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.687026][T28374] CPU: 1 PID: 28374 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1334.695795][T28374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.697126][T28375] FAULT_INJECTION: forcing a failure. [ 1334.697126][T28375] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.705848][T28374] Call Trace: [ 1334.705858][T28374] dump_stack_lvl+0xd6/0x122 [ 1334.726440][T28374] dump_stack+0x11/0x1b [ 1334.730594][T28374] should_fail+0x23c/0x250 [ 1334.735105][T28374] __should_failslab+0x81/0x90 [ 1334.739917][T28374] should_failslab+0x5/0x20 [ 1334.744424][T28374] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1334.750140][T28374] ? __kmalloc_node+0x30/0x40 [ 1334.754850][T28374] __kmalloc_node+0x30/0x40 [ 1334.759348][T28374] kvmalloc_node+0x81/0x110 [ 1334.763839][T28374] __list_lru_init+0x2d7/0x680 [ 1334.768602][T28374] alloc_super+0x490/0x520 [ 1334.773116][T28374] ? mount_bdev+0x290/0x290 [ 1334.777615][T28374] sget+0x1a5/0x400 [ 1334.781450][T28374] ? test_bdev_super+0x30/0x30 [ 1334.786301][T28374] mount_bdev+0xd3/0x290 [ 1334.790614][T28374] ? ext4_mount+0x40/0x40 [ 1334.794934][T28374] ? ext4_errno_to_code+0x110/0x110 [ 1334.800116][T28374] ext4_mount+0x2d/0x40 [ 1334.804256][T28374] legacy_get_tree+0x70/0xc0 [ 1334.808925][T28374] vfs_get_tree+0x4a/0x1a0 [ 1334.813324][T28374] path_mount+0x11ec/0x1d20 [ 1334.818086][T28374] __se_sys_mount+0x24b/0x2f0 [ 1334.822908][T28374] __x64_sys_mount+0x63/0x70 [ 1334.827491][T28374] do_syscall_64+0x44/0xa0 [ 1334.831912][T28374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1334.837798][T28374] RIP: 0033:0x467b1a [ 1334.841701][T28374] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1334.861912][T28374] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1334.870490][T28374] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1334.878558][T28374] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1334.886777][T28374] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1334.894764][T28374] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1334.902815][T28374] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1334.910876][T28375] CPU: 0 PID: 28375 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1334.920074][T28375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.930196][T28375] Call Trace: [ 1334.933469][T28375] dump_stack_lvl+0xd6/0x122 [ 1334.938203][T28375] dump_stack+0x11/0x1b [ 1334.942360][T28375] should_fail+0x23c/0x250 [ 1334.946777][T28375] ? getname_flags+0x84/0x3f0 [ 1334.952697][T28375] __should_failslab+0x81/0x90 [ 1334.957463][T28375] should_failslab+0x5/0x20 [ 1334.962004][T28375] kmem_cache_alloc+0x4f/0x300 [ 1334.966783][T28375] ? should_fail+0xd6/0x250 [ 1334.971299][T28375] getname_flags+0x84/0x3f0 [ 1334.975893][T28375] ? should_fail+0xd6/0x250 [ 1334.980511][T28375] user_path_at_empty+0x28/0x110 [ 1334.985551][T28375] __se_sys_mount+0x217/0x2f0 [ 1334.990417][T28375] __x64_sys_mount+0x63/0x70 [ 1334.995051][T28375] do_syscall_64+0x44/0xa0 [ 1334.999548][T28375] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1335.005593][T28375] RIP: 0033:0x467b1a [ 1335.006160][T28377] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1335.009490][T28375] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.009511][T28375] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1335.009532][T28375] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1335.021014][T28377] EXT4-fs (loop2): get root inode failed [ 1335.040576][T28375] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1335.040595][T28375] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1335.040606][T28375] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:59:47 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1335.040617][T28375] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1335.085773][T28370] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1335.086693][T28377] EXT4-fs (loop2): mount failed [ 1335.112721][T28370] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1335.122942][T28370] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:47 executing program 0 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:47 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14005703, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1335.204642][T28410] loop2: detected capacity change from 0 to 264192 [ 1335.222449][T28412] loop0: detected capacity change from 0 to 264192 [ 1335.234032][T28412] FAULT_INJECTION: forcing a failure. [ 1335.234032][T28412] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.246901][T28412] CPU: 0 PID: 28412 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1335.255929][T28412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.267538][T28412] Call Trace: [ 1335.271074][T28412] dump_stack_lvl+0xd6/0x122 [ 1335.275765][T28412] dump_stack+0x11/0x1b [ 1335.279944][T28412] should_fail+0x23c/0x250 [ 1335.284474][T28412] ? __list_lru_init+0x70/0x680 [ 1335.289387][T28412] __should_failslab+0x81/0x90 [ 1335.293285][T28423] loop5: detected capacity change from 0 to 264192 [ 1335.294194][T28412] should_failslab+0x5/0x20 [ 1335.303150][T28423] FAULT_INJECTION: forcing a failure. [ 1335.303150][T28423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1335.305276][T28412] __kmalloc+0x6f/0x350 [ 1335.305300][T28412] __list_lru_init+0x70/0x680 [ 1335.327119][T28412] alloc_super+0x4bf/0x520 [ 1335.331631][T28412] ? mount_bdev+0x290/0x290 [ 1335.336208][T28412] sget+0x1a5/0x400 [ 1335.340031][T28412] ? test_bdev_super+0x30/0x30 [ 1335.344797][T28412] mount_bdev+0xd3/0x290 [ 1335.349045][T28412] ? ext4_mount+0x40/0x40 [ 1335.353366][T28412] ? ext4_errno_to_code+0x110/0x110 [ 1335.358672][T28412] ext4_mount+0x2d/0x40 [ 1335.362890][T28412] legacy_get_tree+0x70/0xc0 [ 1335.367476][T28412] vfs_get_tree+0x4a/0x1a0 [ 1335.371896][T28412] path_mount+0x11ec/0x1d20 [ 1335.376469][T28412] __se_sys_mount+0x24b/0x2f0 [ 1335.381171][T28412] __x64_sys_mount+0x63/0x70 [ 1335.385754][T28412] do_syscall_64+0x44/0xa0 [ 1335.390236][T28412] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1335.396171][T28412] RIP: 0033:0x467b1a [ 1335.400053][T28412] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.419648][T28412] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1335.428098][T28412] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1335.436361][T28412] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1335.444499][T28412] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1335.452472][T28412] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1335.460449][T28412] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1335.468491][T28423] CPU: 1 PID: 28423 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1335.477253][T28423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.487304][T28423] Call Trace: [ 1335.490605][T28423] dump_stack_lvl+0xd6/0x122 [ 1335.495180][T28423] dump_stack+0x11/0x1b [ 1335.499355][T28423] should_fail+0x23c/0x250 [ 1335.503936][T28423] should_fail_usercopy+0x16/0x20 [ 1335.508945][T28423] strncpy_from_user+0x21/0x250 [ 1335.513956][T28423] getname_flags+0xb8/0x3f0 [ 1335.518528][T28423] ? should_fail+0xd6/0x250 [ 1335.523011][T28423] user_path_at_empty+0x28/0x110 [ 1335.527998][T28423] __se_sys_mount+0x217/0x2f0 [ 1335.532704][T28423] __x64_sys_mount+0x63/0x70 [ 1335.537365][T28423] do_syscall_64+0x44/0xa0 [ 1335.542124][T28423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1335.548018][T28423] RIP: 0033:0x467b1a [ 1335.551918][T28423] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.571880][T28423] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1335.580328][T28423] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1335.588287][T28423] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1335.596349][T28423] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 08:59:48 executing program 0 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1335.604323][T28423] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1335.612460][T28423] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1335.627773][T28422] loop3: detected capacity change from 0 to 264192 [ 1335.691512][T28442] loop0: detected capacity change from 0 to 264192 [ 1335.713712][T28442] FAULT_INJECTION: forcing a failure. [ 1335.713712][T28442] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.726893][T28442] CPU: 1 PID: 28442 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1335.735659][T28442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.745720][T28442] Call Trace: [ 1335.748999][T28442] dump_stack_lvl+0xd6/0x122 [ 1335.753597][T28442] dump_stack+0x11/0x1b [ 1335.757760][T28442] should_fail+0x23c/0x250 [ 1335.762209][T28442] ? __list_lru_init+0x70/0x680 [ 1335.767158][T28442] __should_failslab+0x81/0x90 [ 1335.771925][T28442] should_failslab+0x5/0x20 [ 1335.776435][T28442] __kmalloc+0x6f/0x350 [ 1335.780598][T28442] __list_lru_init+0x70/0x680 [ 1335.785289][T28442] alloc_super+0x4bf/0x520 [ 1335.789770][T28442] ? mount_bdev+0x290/0x290 [ 1335.794275][T28442] sget+0x1a5/0x400 [ 1335.798176][T28442] ? test_bdev_super+0x30/0x30 [ 1335.802945][T28442] mount_bdev+0xd3/0x290 [ 1335.807188][T28442] ? ext4_mount+0x40/0x40 [ 1335.811514][T28442] ? ext4_errno_to_code+0x110/0x110 [ 1335.816807][T28442] ext4_mount+0x2d/0x40 [ 1335.821032][T28442] legacy_get_tree+0x70/0xc0 [ 1335.825621][T28442] vfs_get_tree+0x4a/0x1a0 [ 1335.830031][T28442] path_mount+0x11ec/0x1d20 [ 1335.834565][T28442] __se_sys_mount+0x24b/0x2f0 [ 1335.839257][T28442] __x64_sys_mount+0x63/0x70 [ 1335.843834][T28442] do_syscall_64+0x44/0xa0 [ 1335.848243][T28442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1335.854206][T28442] RIP: 0033:0x467b1a [ 1335.858083][T28442] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.877898][T28442] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1335.886438][T28442] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1335.894399][T28442] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1335.902442][T28442] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1335.910419][T28442] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1335.918686][T28442] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:50 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:50 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:50 executing program 0 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14005e00, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1337.675544][T28470] loop0: detected capacity change from 0 to 264192 [ 1337.678297][T28473] loop3: detected capacity change from 0 to 264192 [ 1337.685291][T28471] loop2: detected capacity change from 0 to 264192 [ 1337.689501][T28469] loop5: detected capacity change from 0 to 264192 [ 1337.731954][T28469] FAULT_INJECTION: forcing a failure. [ 1337.731954][T28469] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.744630][T28469] CPU: 0 PID: 28469 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1337.752999][T28470] FAULT_INJECTION: forcing a failure. [ 1337.752999][T28470] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.753686][T28469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.776288][T28469] Call Trace: [ 1337.779574][T28469] dump_stack_lvl+0xd6/0x122 [ 1337.784156][T28469] dump_stack+0x11/0x1b [ 1337.788384][T28469] should_fail+0x23c/0x250 [ 1337.792795][T28469] __should_failslab+0x81/0x90 [ 1337.797560][T28469] ? alloc_fs_context+0x46/0x500 [ 1337.802510][T28469] should_failslab+0x5/0x20 [ 1337.807004][T28469] kmem_cache_alloc_trace+0x52/0x320 [ 1337.812288][T28469] alloc_fs_context+0x46/0x500 [ 1337.817042][T28469] ? strncmp+0x34/0x70 [ 1337.821227][T28469] fs_context_for_mount+0x1d/0x20 [ 1337.826241][T28469] path_mount+0xe0d/0x1d20 [ 1337.830650][T28469] __se_sys_mount+0x24b/0x2f0 [ 1337.835607][T28469] __x64_sys_mount+0x63/0x70 [ 1337.840267][T28469] do_syscall_64+0x44/0xa0 [ 1337.844673][T28469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1337.850558][T28469] RIP: 0033:0x467b1a [ 1337.854435][T28469] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.874215][T28469] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1337.882613][T28469] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1337.890656][T28469] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1337.898895][T28469] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1337.907150][T28469] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1337.915552][T28469] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1337.923507][T28470] CPU: 1 PID: 28470 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1337.932264][T28470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.942754][T28470] Call Trace: [ 1337.946025][T28470] dump_stack_lvl+0xd6/0x122 [ 1337.950713][T28470] dump_stack+0x11/0x1b [ 1337.955098][T28470] should_fail+0x23c/0x250 [ 1337.959650][T28470] ? __list_lru_init+0x70/0x680 [ 1337.964502][T28470] __should_failslab+0x81/0x90 [ 1337.969263][T28470] should_failslab+0x5/0x20 [ 1337.973767][T28470] __kmalloc+0x6f/0x350 [ 1337.977961][T28470] __list_lru_init+0x70/0x680 [ 1337.982720][T28470] alloc_super+0x4bf/0x520 [ 1337.987131][T28470] ? mount_bdev+0x290/0x290 [ 1337.991614][T28470] sget+0x1a5/0x400 [ 1337.995422][T28470] ? test_bdev_super+0x30/0x30 [ 1338.000529][T28470] mount_bdev+0xd3/0x290 [ 1338.004845][T28470] ? ext4_mount+0x40/0x40 [ 1338.009170][T28470] ? ext4_errno_to_code+0x110/0x110 [ 1338.015064][T28470] ext4_mount+0x2d/0x40 [ 1338.019198][T28470] legacy_get_tree+0x70/0xc0 [ 1338.023823][T28470] vfs_get_tree+0x4a/0x1a0 [ 1338.028257][T28470] path_mount+0x11ec/0x1d20 [ 1338.032760][T28470] __se_sys_mount+0x24b/0x2f0 [ 1338.037466][T28470] __x64_sys_mount+0x63/0x70 [ 1338.042097][T28470] do_syscall_64+0x44/0xa0 [ 1338.046607][T28470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1338.052502][T28470] RIP: 0033:0x467b1a [ 1338.056383][T28470] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:59:50 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1338.076076][T28470] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1338.084478][T28470] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1338.092478][T28470] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1338.100585][T28470] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1338.108539][T28470] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1338.116604][T28470] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4803}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x5, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14006700, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1338.219495][T28506] loop2: detected capacity change from 0 to 264192 [ 1338.237735][T28495] loop5: detected capacity change from 0 to 264192 [ 1338.254359][T28495] FAULT_INJECTION: forcing a failure. [ 1338.254359][T28495] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.267669][T28495] CPU: 0 PID: 28495 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1338.276524][T28495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.286757][T28495] Call Trace: [ 1338.290063][T28495] dump_stack_lvl+0xd6/0x122 [ 1338.294799][T28495] dump_stack+0x11/0x1b [ 1338.298965][T28495] should_fail+0x23c/0x250 [ 1338.303373][T28495] __should_failslab+0x81/0x90 [ 1338.308130][T28495] ? legacy_init_fs_context+0x2d/0x70 [ 1338.313512][T28495] should_failslab+0x5/0x20 [ 1338.318006][T28495] kmem_cache_alloc_trace+0x52/0x320 [ 1338.323305][T28495] ? alloc_fs_context+0x46/0x500 [ 1338.328347][T28495] legacy_init_fs_context+0x2d/0x70 [ 1338.333625][T28495] alloc_fs_context+0x419/0x500 [ 1338.338463][T28495] fs_context_for_mount+0x1d/0x20 [ 1338.343512][T28495] path_mount+0xe0d/0x1d20 [ 1338.347923][T28495] __se_sys_mount+0x24b/0x2f0 [ 1338.352679][T28495] __x64_sys_mount+0x63/0x70 [ 1338.357356][T28495] do_syscall_64+0x44/0xa0 [ 1338.361776][T28495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1338.367664][T28495] RIP: 0033:0x467b1a [ 1338.371659][T28495] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1338.391562][T28495] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1338.400404][T28495] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1338.408370][T28495] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 08:59:50 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1338.416424][T28495] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1338.424388][T28495] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1338.432359][T28495] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1338.449447][T28517] loop3: detected capacity change from 0 to 264192 [ 1338.486231][T28517] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1338.509263][T28517] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1338.537852][T28517] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:53 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x6, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:53 executing program 0 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:53 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:53 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007700, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1340.700921][T28548] loop3: detected capacity change from 0 to 264192 [ 1340.713987][T28554] loop5: detected capacity change from 0 to 264192 [ 1340.716803][T28553] loop2: detected capacity change from 0 to 264192 [ 1340.727825][T28554] FAULT_INJECTION: forcing a failure. [ 1340.727825][T28554] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.734565][T28556] loop0: detected capacity change from 0 to 264192 [ 1340.740506][T28554] CPU: 1 PID: 28554 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1340.755699][T28554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.756406][T28556] FAULT_INJECTION: forcing a failure. [ 1340.756406][T28556] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.765943][T28554] Call Trace: [ 1340.765953][T28554] dump_stack_lvl+0xd6/0x122 [ 1340.765978][T28554] dump_stack+0x11/0x1b [ 1340.765994][T28554] should_fail+0x23c/0x250 [ 1340.766010][T28554] ? vfs_parse_fs_string+0x6d/0xd0 [ 1340.800371][T28554] __should_failslab+0x81/0x90 [ 1340.805262][T28554] should_failslab+0x5/0x20 [ 1340.809749][T28554] __kmalloc_track_caller+0x6d/0x350 [ 1340.815017][T28554] kmemdup_nul+0x27/0x70 [ 1340.819269][T28554] vfs_parse_fs_string+0x6d/0xd0 [ 1340.824193][T28554] path_mount+0xfb1/0x1d20 [ 1340.828629][T28554] __se_sys_mount+0x24b/0x2f0 [ 1340.833410][T28554] __x64_sys_mount+0x63/0x70 [ 1340.837995][T28554] do_syscall_64+0x44/0xa0 [ 1340.842437][T28554] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1340.848366][T28554] RIP: 0033:0x467b1a [ 1340.852238][T28554] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1340.871856][T28554] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1340.880262][T28554] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1340.888225][T28554] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1340.896176][T28554] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1340.904140][T28554] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1340.912106][T28554] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1340.920071][T28556] CPU: 0 PID: 28556 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1340.929003][T28556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.939140][T28556] Call Trace: [ 1340.942423][T28556] dump_stack_lvl+0xd6/0x122 [ 1340.947027][T28556] dump_stack+0x11/0x1b [ 1340.951204][T28556] should_fail+0x23c/0x250 [ 1340.955620][T28556] ? ext4_fill_super+0x3d/0x7840 [ 1340.960551][T28556] __should_failslab+0x81/0x90 [ 1340.965312][T28556] should_failslab+0x5/0x20 [ 1340.969841][T28556] __kmalloc_track_caller+0x6d/0x350 [ 1340.975480][T28556] ? bdev_name+0x1e1/0x240 [ 1340.979992][T28556] kstrdup+0x31/0x70 [ 1340.983919][T28556] ext4_fill_super+0x3d/0x7840 [ 1340.988673][T28556] ? vsnprintf+0xe8f/0xed0 [ 1340.993161][T28556] ? snprintf+0x83/0xb0 [ 1340.997299][T28556] ? set_blocksize+0x197/0x270 [ 1341.002084][T28556] mount_bdev+0x1e8/0x290 [ 1341.006401][T28556] ? ext4_mount+0x40/0x40 [ 1341.010712][T28556] ? ext4_errno_to_code+0x110/0x110 [ 1341.015893][T28556] ext4_mount+0x2d/0x40 [ 1341.020030][T28556] legacy_get_tree+0x70/0xc0 [ 1341.024608][T28556] vfs_get_tree+0x4a/0x1a0 [ 1341.029014][T28556] path_mount+0x11ec/0x1d20 [ 1341.033507][T28556] __se_sys_mount+0x24b/0x2f0 [ 1341.038196][T28556] __x64_sys_mount+0x63/0x70 [ 1341.042820][T28556] do_syscall_64+0x44/0xa0 [ 1341.047223][T28556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1341.053355][T28556] RIP: 0033:0x467b1a [ 1341.057235][T28556] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.076831][T28556] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1341.085239][T28556] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1341.093200][T28556] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 08:59:53 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:53 executing program 0 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1341.101180][T28556] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1341.109139][T28556] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1341.117095][T28556] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1341.172011][T28553] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1341.184208][T28553] EXT4-fs (loop2): get root inode failed [ 1341.190049][T28553] EXT4-fs (loop2): mount failed [ 1341.196311][T28548] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature 08:59:53 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1341.213317][T28548] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1341.220950][T28571] loop5: detected capacity change from 0 to 264192 [ 1341.231045][T28578] loop0: detected capacity change from 0 to 264192 [ 1341.236461][T28548] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1341.250648][T28578] FAULT_INJECTION: forcing a failure. [ 1341.250648][T28578] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.263451][T28578] CPU: 1 PID: 28578 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1341.272562][T28578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.278367][T28571] FAULT_INJECTION: forcing a failure. [ 1341.278367][T28571] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.282637][T28578] Call Trace: [ 1341.282688][T28578] dump_stack_lvl+0xd6/0x122 [ 1341.282712][T28578] dump_stack+0x11/0x1b [ 1341.282729][T28578] should_fail+0x23c/0x250 [ 1341.282746][T28578] __should_failslab+0x81/0x90 [ 1341.319784][T28578] ? ext4_fill_super+0x1f0/0x7840 [ 1341.324800][T28578] should_failslab+0x5/0x20 [ 1341.329351][T28578] kmem_cache_alloc_trace+0x52/0x320 [ 1341.334645][T28578] ? ext4_fill_super+0x62/0x7840 [ 1341.339867][T28578] ext4_fill_super+0x1f0/0x7840 [ 1341.344712][T28578] ? vsnprintf+0xe8f/0xed0 [ 1341.349159][T28578] ? snprintf+0x83/0xb0 [ 1341.353320][T28578] ? set_blocksize+0x197/0x270 [ 1341.358074][T28578] mount_bdev+0x1e8/0x290 [ 1341.362388][T28578] ? ext4_mount+0x40/0x40 [ 1341.366729][T28578] ? ext4_errno_to_code+0x110/0x110 [ 1341.372010][T28578] ext4_mount+0x2d/0x40 [ 1341.376376][T28578] legacy_get_tree+0x70/0xc0 [ 1341.381071][T28578] vfs_get_tree+0x4a/0x1a0 [ 1341.385591][T28578] path_mount+0x11ec/0x1d20 [ 1341.390152][T28578] __se_sys_mount+0x24b/0x2f0 [ 1341.394872][T28578] __x64_sys_mount+0x63/0x70 [ 1341.399466][T28578] do_syscall_64+0x44/0xa0 [ 1341.403878][T28578] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1341.409777][T28578] RIP: 0033:0x467b1a [ 1341.413778][T28578] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.433862][T28578] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1341.442299][T28578] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1341.450258][T28578] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1341.458258][T28578] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1341.466234][T28578] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1341.474190][T28578] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1341.482186][T28571] CPU: 0 PID: 28571 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1341.490966][T28571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.501102][T28571] Call Trace: [ 1341.504394][T28571] dump_stack_lvl+0xd6/0x122 [ 1341.508987][T28571] dump_stack+0x11/0x1b [ 1341.513130][T28571] should_fail+0x23c/0x250 [ 1341.517560][T28571] ? vfs_parse_fs_string+0x6d/0xd0 [ 1341.522672][T28571] __should_failslab+0x81/0x90 [ 1341.527435][T28571] should_failslab+0x5/0x20 [ 1341.531962][T28571] __kmalloc_track_caller+0x6d/0x350 [ 1341.537296][T28571] kmemdup_nul+0x27/0x70 [ 1341.541561][T28571] vfs_parse_fs_string+0x6d/0xd0 [ 1341.546584][T28571] path_mount+0xfb1/0x1d20 [ 1341.550993][T28571] __se_sys_mount+0x24b/0x2f0 [ 1341.555672][T28571] __x64_sys_mount+0x63/0x70 [ 1341.560345][T28571] do_syscall_64+0x44/0xa0 [ 1341.564765][T28571] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1341.570700][T28571] RIP: 0033:0x467b1a [ 1341.574607][T28571] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.594315][T28571] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1341.602720][T28571] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1341.611368][T28571] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 08:59:54 executing program 0 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1341.619425][T28571] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1341.627461][T28571] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1341.635435][T28571] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 08:59:54 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:54 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1341.741572][T28602] loop5: detected capacity change from 0 to 264192 [ 1341.749517][T28604] loop0: detected capacity change from 0 to 264192 [ 1341.750699][T28602] FAULT_INJECTION: forcing a failure. [ 1341.750699][T28602] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.769591][T28602] CPU: 1 PID: 28602 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1341.775354][T28604] FAULT_INJECTION: forcing a failure. [ 1341.775354][T28604] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.778456][T28602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.778468][T28602] Call Trace: [ 1341.778476][T28602] dump_stack_lvl+0xd6/0x122 [ 1341.778500][T28602] dump_stack+0x11/0x1b [ 1341.778517][T28602] should_fail+0x23c/0x250 [ 1341.817939][T28602] ? vfs_parse_fs_string+0x6d/0xd0 [ 1341.823048][T28602] __should_failslab+0x81/0x90 [ 1341.827802][T28602] should_failslab+0x5/0x20 [ 1341.832374][T28602] __kmalloc_track_caller+0x6d/0x350 [ 1341.837693][T28602] kmemdup_nul+0x27/0x70 [ 1341.841993][T28602] vfs_parse_fs_string+0x6d/0xd0 [ 1341.846937][T28602] path_mount+0xfb1/0x1d20 [ 1341.851343][T28602] __se_sys_mount+0x24b/0x2f0 [ 1341.856018][T28602] __x64_sys_mount+0x63/0x70 [ 1341.860595][T28602] do_syscall_64+0x44/0xa0 [ 1341.865176][T28602] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1341.871340][T28602] RIP: 0033:0x467b1a [ 1341.875257][T28602] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.894849][T28602] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1341.903322][T28602] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1341.911369][T28602] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1341.919326][T28602] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1341.927287][T28602] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1341.935265][T28602] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1341.943228][T28604] CPU: 0 PID: 28604 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1341.952095][T28604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.962145][T28604] Call Trace: [ 1341.965425][T28604] dump_stack_lvl+0xd6/0x122 [ 1341.970025][T28604] dump_stack+0x11/0x1b [ 1341.974305][T28604] should_fail+0x23c/0x250 [ 1341.978729][T28604] ? mempool_alloc_slab+0x16/0x20 [ 1341.983843][T28604] __should_failslab+0x81/0x90 [ 1341.988657][T28604] should_failslab+0x5/0x20 [ 1341.993170][T28604] kmem_cache_alloc+0x4f/0x300 [ 1341.997934][T28604] mempool_alloc_slab+0x16/0x20 [ 1342.002836][T28604] ? mempool_free+0x130/0x130 [ 1342.007517][T28604] mempool_alloc+0x9d/0x310 [ 1342.012160][T28604] ? pagecache_get_page+0x7aa/0x910 [ 1342.017454][T28604] bio_alloc_bioset+0xcc/0x530 [ 1342.022208][T28604] ? __find_get_block+0x669/0x930 [ 1342.027346][T28604] submit_bh_wbc+0x130/0x330 [ 1342.031936][T28604] ? __getblk_gfp+0x4d3/0x590 [ 1342.036685][T28604] submit_bh+0x21/0x30 [ 1342.040827][T28604] ? __wait_on_buffer+0x60/0x60 [ 1342.045678][T28604] ext4_read_bh+0xf1/0x170 [ 1342.050210][T28604] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 1342.055756][T28604] ext4_fill_super+0x427/0x7840 [ 1342.060615][T28604] ? vsnprintf+0xe8f/0xed0 [ 1342.065022][T28604] ? snprintf+0x83/0xb0 [ 1342.069173][T28604] ? set_blocksize+0x197/0x270 [ 1342.073933][T28604] mount_bdev+0x1e8/0x290 [ 1342.078294][T28604] ? ext4_mount+0x40/0x40 [ 1342.082608][T28604] ? ext4_errno_to_code+0x110/0x110 [ 1342.087964][T28604] ext4_mount+0x2d/0x40 [ 1342.092104][T28604] legacy_get_tree+0x70/0xc0 [ 1342.096750][T28604] vfs_get_tree+0x4a/0x1a0 [ 1342.101247][T28604] path_mount+0x11ec/0x1d20 [ 1342.105741][T28604] __se_sys_mount+0x24b/0x2f0 [ 1342.110407][T28604] __x64_sys_mount+0x63/0x70 [ 1342.115073][T28604] do_syscall_64+0x44/0xa0 [ 1342.119508][T28604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1342.125419][T28604] RIP: 0033:0x467b1a [ 1342.129295][T28604] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.148901][T28604] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1342.157300][T28604] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1342.165418][T28604] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1342.173375][T28604] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1342.181341][T28604] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1342.189298][T28604] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1342.204815][T28604] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1342.221604][T28604] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1342.232612][T28604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 08:59:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007803, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:56 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x7, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:56 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:56 executing program 0 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1343.724118][T28627] loop2: detected capacity change from 0 to 264192 [ 1343.733682][T28631] loop5: detected capacity change from 0 to 264192 [ 1343.734838][T28628] loop0: detected capacity change from 0 to 264192 [ 1343.744647][T28633] loop3: detected capacity change from 0 to 264192 [ 1343.765543][T28631] FAULT_INJECTION: forcing a failure. [ 1343.765543][T28631] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.778308][T28631] CPU: 1 PID: 28631 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1343.787067][T28631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.797231][T28631] Call Trace: [ 1343.800575][T28631] dump_stack_lvl+0xd6/0x122 [ 1343.805153][T28631] dump_stack+0x11/0x1b [ 1343.809298][T28631] should_fail+0x23c/0x250 [ 1343.813789][T28631] __should_failslab+0x81/0x90 [ 1343.818616][T28631] ? alloc_super+0x3a/0x520 [ 1343.823119][T28631] should_failslab+0x5/0x20 [ 1343.827609][T28631] kmem_cache_alloc_trace+0x52/0x320 [ 1343.832875][T28631] ? disk_unblock_events+0x35/0x40 [ 1343.837971][T28631] ? mount_bdev+0x290/0x290 [ 1343.842467][T28631] alloc_super+0x3a/0x520 [ 1343.846782][T28631] ? mount_bdev+0x290/0x290 [ 1343.851266][T28631] sget+0x1a5/0x400 [ 1343.855057][T28631] ? test_bdev_super+0x30/0x30 [ 1343.859833][T28631] mount_bdev+0xd3/0x290 [ 1343.864057][T28631] ? ext4_mount+0x40/0x40 [ 1343.868368][T28631] ? ext4_errno_to_code+0x110/0x110 [ 1343.873548][T28631] ext4_mount+0x2d/0x40 [ 1343.877685][T28631] legacy_get_tree+0x70/0xc0 [ 1343.882314][T28631] vfs_get_tree+0x4a/0x1a0 [ 1343.886710][T28631] path_mount+0x11ec/0x1d20 [ 1343.891215][T28631] __se_sys_mount+0x24b/0x2f0 [ 1343.896225][T28631] __x64_sys_mount+0x63/0x70 [ 1343.900809][T28631] do_syscall_64+0x44/0xa0 [ 1343.905212][T28631] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1343.911185][T28631] RIP: 0033:0x467b1a [ 1343.915060][T28631] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.934654][T28631] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1343.943061][T28631] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1343.951016][T28631] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1343.958969][T28631] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1343.967358][T28631] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1343.975487][T28631] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1344.004835][T28627] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1344.016459][T28627] EXT4-fs (loop2): get root inode failed 08:59:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007900, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1344.022080][T28627] EXT4-fs (loop2): mount failed [ 1344.026402][T28628] FAULT_INJECTION: forcing a failure. [ 1344.026402][T28628] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.039527][T28628] CPU: 0 PID: 28628 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1344.048460][T28628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.058554][T28628] Call Trace: [ 1344.061833][T28628] dump_stack_lvl+0xd6/0x122 [ 1344.066466][T28628] dump_stack+0x11/0x1b [ 1344.070615][T28628] should_fail+0x23c/0x250 [ 1344.075052][T28628] __should_failslab+0x81/0x90 [ 1344.079821][T28628] should_failslab+0x5/0x20 [ 1344.084358][T28628] kmem_cache_alloc_node+0x61/0x2c0 [ 1344.089570][T28628] ? create_task_io_context+0x36/0x210 [ 1344.095029][T28628] create_task_io_context+0x36/0x210 [ 1344.100340][T28628] submit_bio_checks+0x7c3/0x850 [ 1344.105351][T28628] ? mempool_alloc_slab+0x16/0x20 [ 1344.110442][T28628] ? mempool_free+0x130/0x130 [ 1344.115102][T28628] submit_bio_noacct+0x33/0x7d0 [ 1344.119944][T28628] ? bio_add_page+0x380/0x460 [ 1344.124671][T28628] submit_bio+0x10c/0x190 [ 1344.128988][T28628] submit_bh_wbc+0x2f3/0x330 [ 1344.133609][T28628] submit_bh+0x21/0x30 [ 1344.137667][T28628] ? __wait_on_buffer+0x60/0x60 [ 1344.142506][T28628] ext4_read_bh+0xf1/0x170 [ 1344.147130][T28628] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 1344.152491][T28628] ext4_fill_super+0x427/0x7840 [ 1344.157325][T28628] ? vsnprintf+0xe8f/0xed0 [ 1344.161729][T28628] ? snprintf+0x83/0xb0 [ 1344.165869][T28628] ? set_blocksize+0x197/0x270 [ 1344.170902][T28628] mount_bdev+0x1e8/0x290 [ 1344.175252][T28628] ? ext4_mount+0x40/0x40 [ 1344.179563][T28628] ? ext4_errno_to_code+0x110/0x110 [ 1344.184746][T28628] ext4_mount+0x2d/0x40 [ 1344.189270][T28628] legacy_get_tree+0x70/0xc0 [ 1344.193848][T28628] vfs_get_tree+0x4a/0x1a0 [ 1344.198283][T28628] path_mount+0x11ec/0x1d20 [ 1344.202843][T28628] __se_sys_mount+0x24b/0x2f0 [ 1344.207554][T28628] __x64_sys_mount+0x63/0x70 [ 1344.212132][T28628] do_syscall_64+0x44/0xa0 [ 1344.216706][T28628] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1344.222633][T28628] RIP: 0033:0x467b1a [ 1344.226510][T28628] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.246196][T28628] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1344.254705][T28628] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1344.262662][T28628] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 08:59:56 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1344.270625][T28628] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1344.278580][T28628] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1344.286542][T28628] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 08:59:56 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d03}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1344.329495][T28628] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1344.344056][T28628] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1344.365863][T28652] loop3: detected capacity change from 0 to 264192 08:59:56 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x8, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:56 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9700}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1344.442888][T28628] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1344.482711][T28680] loop5: detected capacity change from 0 to 264192 [ 1344.491945][T28680] FAULT_INJECTION: forcing a failure. [ 1344.491945][T28680] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.504585][T28680] CPU: 1 PID: 28680 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1344.513437][T28680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.523590][T28680] Call Trace: [ 1344.527332][T28680] dump_stack_lvl+0xd6/0x122 [ 1344.531933][T28680] dump_stack+0x11/0x1b [ 1344.536089][T28680] should_fail+0x23c/0x250 [ 1344.540512][T28680] ? __list_lru_init+0x70/0x680 [ 1344.545464][T28680] __should_failslab+0x81/0x90 [ 1344.550321][T28680] should_failslab+0x5/0x20 [ 1344.554836][T28680] __kmalloc+0x6f/0x350 [ 1344.558998][T28680] ? prealloc_memcg_shrinker+0x444/0x460 [ 1344.564619][T28680] __list_lru_init+0x70/0x680 [ 1344.569292][T28680] alloc_super+0x490/0x520 [ 1344.573719][T28680] ? mount_bdev+0x290/0x290 [ 1344.578223][T28680] sget+0x1a5/0x400 [ 1344.582038][T28680] ? test_bdev_super+0x30/0x30 [ 1344.586852][T28680] mount_bdev+0xd3/0x290 [ 1344.591080][T28680] ? ext4_mount+0x40/0x40 [ 1344.595461][T28680] ? ext4_errno_to_code+0x110/0x110 [ 1344.600672][T28680] ext4_mount+0x2d/0x40 [ 1344.604861][T28680] legacy_get_tree+0x70/0xc0 [ 1344.609497][T28680] vfs_get_tree+0x4a/0x1a0 [ 1344.613911][T28680] path_mount+0x11ec/0x1d20 [ 1344.618416][T28680] __se_sys_mount+0x24b/0x2f0 [ 1344.623091][T28680] __x64_sys_mount+0x63/0x70 [ 1344.627688][T28680] do_syscall_64+0x44/0xa0 [ 1344.632198][T28680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1344.638177][T28680] RIP: 0033:0x467b1a [ 1344.642152][T28680] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.662082][T28680] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1344.670548][T28680] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1344.678516][T28680] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1344.686484][T28680] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1344.694530][T28680] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1344.702487][T28680] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1344.717760][T28686] loop2: detected capacity change from 0 to 264192 [ 1344.785334][T28686] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1344.796857][T28686] EXT4-fs (loop2): get root inode failed [ 1344.802483][T28686] EXT4-fs (loop2): mount failed 08:59:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:59:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007903, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:59 executing program 0 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:59 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:59 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb401}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1346.796443][T28712] loop2: detected capacity change from 0 to 264192 [ 1346.803744][T28713] loop5: detected capacity change from 0 to 264192 [ 1346.819286][T28719] loop0: detected capacity change from 0 to 264192 [ 1346.828096][T28713] FAULT_INJECTION: forcing a failure. [ 1346.828096][T28713] name failslab, interval 1, probability 0, space 0, times 0 [ 1346.840741][T28713] CPU: 1 PID: 28713 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1346.849581][T28713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1346.859716][T28713] Call Trace: [ 1346.862983][T28713] dump_stack_lvl+0xd6/0x122 [ 1346.867650][T28713] dump_stack+0x11/0x1b [ 1346.871852][T28713] should_fail+0x23c/0x250 [ 1346.876358][T28713] __should_failslab+0x81/0x90 [ 1346.881162][T28713] should_failslab+0x5/0x20 [ 1346.885649][T28713] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1346.891377][T28713] ? __kmalloc_node+0x30/0x40 [ 1346.896052][T28713] __kmalloc_node+0x30/0x40 [ 1346.900540][T28713] kvmalloc_node+0x81/0x110 [ 1346.905133][T28713] __list_lru_init+0x2d7/0x680 [ 1346.909937][T28713] alloc_super+0x490/0x520 [ 1346.914342][T28713] ? mount_bdev+0x290/0x290 [ 1346.918888][T28713] sget+0x1a5/0x400 [ 1346.922686][T28713] ? test_bdev_super+0x30/0x30 [ 1346.927444][T28713] mount_bdev+0xd3/0x290 [ 1346.931675][T28713] ? ext4_mount+0x40/0x40 [ 1346.936175][T28713] ? ext4_errno_to_code+0x110/0x110 [ 1346.941453][T28713] ext4_mount+0x2d/0x40 [ 1346.945590][T28713] legacy_get_tree+0x70/0xc0 [ 1346.950252][T28713] vfs_get_tree+0x4a/0x1a0 [ 1346.954663][T28713] path_mount+0x11ec/0x1d20 [ 1346.959252][T28713] __se_sys_mount+0x24b/0x2f0 [ 1346.963984][T28713] __x64_sys_mount+0x63/0x70 [ 1346.968676][T28713] do_syscall_64+0x44/0xa0 [ 1346.973084][T28713] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1346.979063][T28713] RIP: 0033:0x467b1a [ 1346.983065][T28713] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1347.002811][T28713] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1347.011210][T28713] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1347.019170][T28713] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1347.027122][T28713] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1347.035108][T28713] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1347.043301][T28713] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1347.058021][T28721] loop3: detected capacity change from 0 to 264192 08:59:59 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd502}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1347.088838][T28721] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1347.106475][T28719] FAULT_INJECTION: forcing a failure. [ 1347.106475][T28719] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.119106][T28719] CPU: 0 PID: 28719 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1347.127959][T28719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.138021][T28719] Call Trace: [ 1347.141286][T28719] dump_stack_lvl+0xd6/0x122 [ 1347.145867][T28719] dump_stack+0x11/0x1b [ 1347.150025][T28719] should_fail+0x23c/0x250 [ 1347.154498][T28719] __should_failslab+0x81/0x90 [ 1347.159334][T28719] should_failslab+0x5/0x20 [ 1347.163885][T28719] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1347.169637][T28719] ? __crypto_alg_lookup+0x36d/0x3a0 [ 1347.174916][T28719] ? __kmalloc_node+0x30/0x40 [ 1347.179677][T28719] __kmalloc_node+0x30/0x40 [ 1347.184185][T28719] crypto_create_tfm_node+0x4a/0x1f0 [ 1347.189456][T28719] ? crypto_alg_mod_lookup+0x397/0x4e0 [ 1347.194901][T28719] crypto_alloc_tfm_node+0x100/0x290 [ 1347.200170][T28719] crypto_alloc_shash+0x2b/0x30 [ 1347.205014][T28719] ext4_fill_super+0x657/0x7840 [ 1347.209957][T28719] ? vsnprintf+0xe8f/0xed0 [ 1347.214357][T28719] ? snprintf+0x83/0xb0 [ 1347.218550][T28719] ? set_blocksize+0x197/0x270 [ 1347.223357][T28719] mount_bdev+0x1e8/0x290 [ 1347.227680][T28719] ? ext4_mount+0x40/0x40 [ 1347.231996][T28719] ? ext4_errno_to_code+0x110/0x110 [ 1347.237210][T28719] ext4_mount+0x2d/0x40 [ 1347.241365][T28719] legacy_get_tree+0x70/0xc0 [ 1347.245970][T28719] vfs_get_tree+0x4a/0x1a0 [ 1347.250370][T28719] path_mount+0x11ec/0x1d20 [ 1347.254866][T28719] __se_sys_mount+0x24b/0x2f0 [ 1347.259527][T28719] __x64_sys_mount+0x63/0x70 [ 1347.264139][T28719] do_syscall_64+0x44/0xa0 [ 1347.268610][T28719] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1347.274493][T28719] RIP: 0033:0x467b1a [ 1347.278438][T28719] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1347.298153][T28719] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1347.306637][T28719] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1347.314761][T28719] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1347.322806][T28719] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1347.330838][T28719] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1347.338791][T28719] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1347.346932][T28719] EXT4-fs (loop0): Cannot load crc32c driver. [ 1347.353724][T28712] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1347.354846][T28721] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1347.365363][T28712] EXT4-fs (loop2): get root inode failed [ 1347.379667][T28721] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1347.380178][T28712] EXT4-fs (loop2): mount failed 08:59:59 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xa, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 08:59:59 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea02}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 08:59:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007a03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1347.474563][T28743] loop2: detected capacity change from 0 to 264192 [ 1347.506365][T28743] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1347.511617][T28753] loop5: detected capacity change from 0 to 264192 08:59:59 executing program 0 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1347.517984][T28743] EXT4-fs (loop2): get root inode failed [ 1347.530200][T28743] EXT4-fs (loop2): mount failed [ 1347.565480][T28759] loop3: detected capacity change from 0 to 264192 [ 1347.586736][T28765] loop0: detected capacity change from 0 to 264192 [ 1347.596425][T28765] FAULT_INJECTION: forcing a failure. [ 1347.596425][T28765] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.597784][T28753] FAULT_INJECTION: forcing a failure. [ 1347.597784][T28753] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.609208][T28765] CPU: 0 PID: 28765 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1347.630804][T28765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.640876][T28765] Call Trace: [ 1347.644324][T28765] dump_stack_lvl+0xd6/0x122 [ 1347.648906][T28765] dump_stack+0x11/0x1b [ 1347.653059][T28765] should_fail+0x23c/0x250 [ 1347.657457][T28765] __should_failslab+0x81/0x90 [ 1347.662209][T28765] should_failslab+0x5/0x20 [ 1347.666875][T28765] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1347.672612][T28765] ? __kmalloc_node+0x30/0x40 [ 1347.677273][T28765] __kmalloc_node+0x30/0x40 [ 1347.681845][T28765] kvmalloc_node+0x81/0x110 [ 1347.687386][T28765] ext4_fill_super+0x318b/0x7840 [ 1347.692314][T28765] ? vsnprintf+0xe8f/0xed0 [ 1347.696786][T28765] ? snprintf+0x83/0xb0 [ 1347.701016][T28765] mount_bdev+0x1e8/0x290 [ 1347.705357][T28765] ? ext4_mount+0x40/0x40 [ 1347.709674][T28765] ? ext4_errno_to_code+0x110/0x110 [ 1347.714866][T28765] ext4_mount+0x2d/0x40 [ 1347.719009][T28765] legacy_get_tree+0x70/0xc0 [ 1347.723591][T28765] vfs_get_tree+0x4a/0x1a0 [ 1347.728013][T28765] path_mount+0x11ec/0x1d20 [ 1347.732596][T28765] __se_sys_mount+0x24b/0x2f0 [ 1347.737264][T28765] __x64_sys_mount+0x63/0x70 [ 1347.741843][T28765] do_syscall_64+0x44/0xa0 [ 1347.746257][T28765] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1347.752317][T28765] RIP: 0033:0x467b1a [ 1347.756533][T28765] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1347.776180][T28765] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1347.784583][T28765] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1347.792542][T28765] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1347.800585][T28765] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1347.808556][T28765] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1347.816518][T28765] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1347.824522][T28765] EXT4-fs (loop0): not enough memory [ 1347.824495][T28753] CPU: 1 PID: 28753 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1347.838538][T28753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.848588][T28753] Call Trace: [ 1347.851857][T28753] dump_stack_lvl+0xd6/0x122 [ 1347.856466][T28753] dump_stack+0x11/0x1b [ 1347.860865][T28753] should_fail+0x23c/0x250 [ 1347.865291][T28753] ? __list_lru_init+0x70/0x680 [ 1347.870354][T28753] __should_failslab+0x81/0x90 [ 1347.875118][T28753] should_failslab+0x5/0x20 [ 1347.879622][T28753] __kmalloc+0x6f/0x350 [ 1347.883767][T28753] __list_lru_init+0x70/0x680 [ 1347.888443][T28753] alloc_super+0x4bf/0x520 [ 1347.892851][T28753] ? mount_bdev+0x290/0x290 [ 1347.897381][T28753] sget+0x1a5/0x400 [ 1347.901183][T28753] ? test_bdev_super+0x30/0x30 [ 1347.905931][T28753] mount_bdev+0xd3/0x290 [ 1347.910248][T28753] ? ext4_mount+0x40/0x40 [ 1347.914574][T28753] ? ext4_errno_to_code+0x110/0x110 [ 1347.919760][T28753] ext4_mount+0x2d/0x40 [ 1347.923903][T28753] legacy_get_tree+0x70/0xc0 [ 1347.928483][T28753] vfs_get_tree+0x4a/0x1a0 [ 1347.932885][T28753] path_mount+0x11ec/0x1d20 [ 1347.937378][T28753] __se_sys_mount+0x24b/0x2f0 [ 1347.942062][T28753] __x64_sys_mount+0x63/0x70 [ 1347.946649][T28753] do_syscall_64+0x44/0xa0 [ 1347.951064][T28753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1347.956954][T28753] RIP: 0033:0x467b1a [ 1347.960834][T28753] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1347.980514][T28753] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1347.989013][T28753] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1347.996971][T28753] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1348.004932][T28753] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1348.013329][T28753] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1348.021557][T28753] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1348.038602][T28759] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1348.051694][T28759] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1348.096090][T28759] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:02 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefff}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xb, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:02 executing program 0 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:02 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14007b03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:02 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1349.837474][T28798] loop5: detected capacity change from 0 to 264192 [ 1349.839149][T28796] loop2: detected capacity change from 0 to 264192 [ 1349.851218][T28799] loop0: detected capacity change from 0 to 264192 [ 1349.853521][T28797] loop3: detected capacity change from 0 to 264192 [ 1349.881276][T28798] FAULT_INJECTION: forcing a failure. [ 1349.881276][T28798] name failslab, interval 1, probability 0, space 0, times 0 [ 1349.888255][T28796] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1349.894046][T28798] CPU: 1 PID: 28798 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1349.905437][T28796] EXT4-fs (loop2): get root inode failed [ 1349.914130][T28798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1349.914143][T28798] Call Trace: [ 1349.914150][T28798] dump_stack_lvl+0xd6/0x122 [ 1349.919792][T28796] EXT4-fs (loop2): mount failed [ 1349.929813][T28798] dump_stack+0x11/0x1b [ 1349.946796][T28798] should_fail+0x23c/0x250 [ 1349.951219][T28798] __should_failslab+0x81/0x90 [ 1349.956043][T28798] should_failslab+0x5/0x20 [ 1349.960646][T28798] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1349.966382][T28798] ? __kmalloc_node+0x30/0x40 [ 1349.971064][T28798] __kmalloc_node+0x30/0x40 [ 1349.975577][T28798] kvmalloc_node+0x81/0x110 [ 1349.980261][T28798] __list_lru_init+0x2d7/0x680 [ 1349.985032][T28798] alloc_super+0x490/0x520 [ 1349.989452][T28798] ? mount_bdev+0x290/0x290 [ 1349.994039][T28798] sget+0x1a5/0x400 [ 1349.997832][T28798] ? test_bdev_super+0x30/0x30 [ 1350.002635][T28798] mount_bdev+0xd3/0x290 [ 1350.006869][T28798] ? ext4_mount+0x40/0x40 [ 1350.011185][T28798] ? ext4_errno_to_code+0x110/0x110 [ 1350.016371][T28798] ext4_mount+0x2d/0x40 [ 1350.020518][T28798] legacy_get_tree+0x70/0xc0 [ 1350.025185][T28798] vfs_get_tree+0x4a/0x1a0 [ 1350.029586][T28798] path_mount+0x11ec/0x1d20 [ 1350.034119][T28798] __se_sys_mount+0x24b/0x2f0 [ 1350.038888][T28798] __x64_sys_mount+0x63/0x70 [ 1350.043576][T28798] do_syscall_64+0x44/0xa0 [ 1350.047992][T28798] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1350.054003][T28798] RIP: 0033:0x467b1a [ 1350.057880][T28798] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.077629][T28798] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 09:00:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14008002, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1350.086164][T28798] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1350.094141][T28798] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1350.102177][T28798] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1350.110641][T28798] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1350.118610][T28798] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 09:00:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xc, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:02 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:02 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1350.201634][T28799] FAULT_INJECTION: forcing a failure. [ 1350.201634][T28799] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.214265][T28799] CPU: 0 PID: 28799 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller #0 [ 1350.223117][T28799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1350.233191][T28799] Call Trace: [ 1350.235943][T28821] loop3: detected capacity change from 0 to 264192 [ 1350.236473][T28799] dump_stack_lvl+0xd6/0x122 [ 1350.247530][T28799] dump_stack+0x11/0x1b [ 1350.251690][T28799] should_fail+0x23c/0x250 [ 1350.256099][T28799] ? mempool_alloc_slab+0x16/0x20 [ 1350.261122][T28799] __should_failslab+0x81/0x90 [ 1350.265879][T28799] should_failslab+0x5/0x20 [ 1350.270387][T28799] kmem_cache_alloc+0x4f/0x300 [ 1350.275149][T28799] mempool_alloc_slab+0x16/0x20 [ 1350.279998][T28799] ? mempool_free+0x130/0x130 [ 1350.284749][T28799] mempool_alloc+0x9d/0x310 [ 1350.289247][T28799] ? pagecache_get_page+0x7aa/0x910 [ 1350.294611][T28799] bio_alloc_bioset+0xcc/0x530 [ 1350.299538][T28799] ? __find_get_block+0x85c/0x930 [ 1350.304565][T28799] submit_bh_wbc+0x130/0x330 [ 1350.309402][T28799] ? __getblk_gfp+0x3f/0x590 [ 1350.313989][T28799] submit_bh+0x21/0x30 [ 1350.318141][T28799] ext4_read_bh_lock+0x184/0x1b0 [ 1350.323419][T28799] ext4_fill_super+0x3662/0x7840 [ 1350.328387][T28799] ? vsnprintf+0xe8f/0xed0 [ 1350.332793][T28799] ? snprintf+0x83/0xb0 [ 1350.336949][T28799] mount_bdev+0x1e8/0x290 [ 1350.341445][T28799] ? ext4_mount+0x40/0x40 [ 1350.345802][T28799] ? ext4_errno_to_code+0x110/0x110 [ 1350.350988][T28799] ext4_mount+0x2d/0x40 [ 1350.355165][T28799] legacy_get_tree+0x70/0xc0 [ 1350.359812][T28799] vfs_get_tree+0x4a/0x1a0 [ 1350.364440][T28799] path_mount+0x11ec/0x1d20 [ 1350.368949][T28799] __se_sys_mount+0x24b/0x2f0 [ 1350.373630][T28799] __x64_sys_mount+0x63/0x70 [ 1350.378293][T28799] do_syscall_64+0x44/0xa0 [ 1350.382708][T28799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1350.388879][T28799] RIP: 0033:0x467b1a [ 1350.392770][T28799] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.412558][T28799] RSP: 002b:00007f1e348c5fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1350.420966][T28799] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1350.429028][T28799] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e348c6000 [ 1350.437066][T28799] RBP: 00007f1e348c6040 R08: 00007f1e348c6040 R09: 0000000020000000 [ 1350.445039][T28799] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1350.452996][T28799] R13: 0000000020000100 R14: 00007f1e348c6000 R15: 0000000020000040 [ 1350.482209][T28829] loop5: detected capacity change from 0 to 264192 [ 1350.491588][T28829] FAULT_INJECTION: forcing a failure. [ 1350.491588][T28829] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.504217][T28829] CPU: 0 PID: 28829 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1350.513075][T28829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1350.523246][T28829] Call Trace: [ 1350.526522][T28829] dump_stack_lvl+0xd6/0x122 [ 1350.531694][T28829] dump_stack+0x11/0x1b [ 1350.535889][T28829] should_fail+0x23c/0x250 [ 1350.540303][T28829] ? ext4_fill_super+0x3d/0x7840 [ 1350.545679][T28829] __should_failslab+0x81/0x90 [ 1350.550493][T28829] should_failslab+0x5/0x20 [ 1350.555087][T28829] __kmalloc_track_caller+0x6d/0x350 [ 1350.558497][T28838] loop2: detected capacity change from 0 to 264192 [ 1350.560391][T28829] ? bdev_name+0x1e1/0x240 [ 1350.571406][T28829] kstrdup+0x31/0x70 [ 1350.576965][T28829] ext4_fill_super+0x3d/0x7840 [ 1350.581734][T28829] ? vsnprintf+0xe8f/0xed0 [ 1350.586186][T28829] ? snprintf+0x83/0xb0 [ 1350.590340][T28829] ? set_blocksize+0x197/0x270 [ 1350.595154][T28829] mount_bdev+0x1e8/0x290 [ 1350.599497][T28829] ? ext4_mount+0x40/0x40 [ 1350.603867][T28829] ? ext4_errno_to_code+0x110/0x110 [ 1350.609123][T28829] ext4_mount+0x2d/0x40 [ 1350.613272][T28829] legacy_get_tree+0x70/0xc0 [ 1350.617857][T28829] vfs_get_tree+0x4a/0x1a0 [ 1350.622276][T28829] path_mount+0x11ec/0x1d20 [ 1350.627503][T28829] __se_sys_mount+0x24b/0x2f0 [ 1350.632204][T28829] __x64_sys_mount+0x63/0x70 [ 1350.636831][T28829] do_syscall_64+0x44/0xa0 [ 1350.641409][T28829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1350.647300][T28829] RIP: 0033:0x467b1a [ 1350.651203][T28829] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.671055][T28829] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1350.684985][T28829] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1350.692938][T28829] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 09:00:02 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1350.700891][T28829] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1350.708843][T28829] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1350.716888][T28829] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1350.734054][T28821] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature 09:00:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1350.749549][T28799] EXT4-fs: failed to create workqueue [ 1350.754937][T28799] EXT4-fs (loop0): mount failed [ 1350.755139][T28821] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1350.770809][T28838] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1350.782574][T28838] EXT4-fs (loop2): get root inode failed [ 1350.788238][T28838] EXT4-fs (loop2): mount failed [ 1350.793007][T28821] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffef}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xd, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:03 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14008003, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1350.893234][T28866] loop2: detected capacity change from 0 to 264192 [ 1350.915904][ T1124] ================================================================== [ 1350.924114][ T1124] BUG: KCSAN: data-race in __lru_add_drain_all / lru_cache_add [ 1350.931654][ T1124] [ 1350.934049][ T1124] write to 0xffff888237c22528 of 1 bytes by task 1152 on cpu 0: [ 1350.941756][ T1124] lru_cache_add+0x75/0x150 [ 1350.946249][ T1124] shmem_getpage_gfp+0xcb9/0x13d0 [ 1350.951347][ T1124] shmem_file_read_iter+0x1b2/0x5d0 [ 1350.956528][ T1124] do_iter_readv_writev+0x2fb/0x380 [ 1350.961728][ T1124] do_iter_read+0x192/0x5d0 [ 1350.966217][ T1124] vfs_iter_read+0x4c/0x70 [ 1350.970630][ T1124] loop_process_work+0x11ae/0x18f0 [ 1350.975821][ T1124] loop_rootcg_workfn+0x1b/0x20 [ 1350.980662][ T1124] process_one_work+0x402/0x910 [ 1350.985580][ T1124] worker_thread+0x636/0xae0 [ 1350.990148][ T1124] kthread+0x262/0x280 [ 1350.994293][ T1124] ret_from_fork+0x1f/0x30 [ 1350.998688][ T1124] [ 1351.001621][ T1124] read to 0xffff888237c22528 of 1 bytes by task 1124 on cpu 1: [ 1351.009144][ T1124] __lru_add_drain_all+0x12c/0x3e0 [ 1351.014238][ T1124] lru_add_drain_all+0xc/0x10 [ 1351.018897][ T1124] invalidate_bdev+0x56/0x80 [ 1351.023477][ T1124] ext4_put_super+0x620/0x910 [ 1351.028135][ T1124] generic_shutdown_super+0xe1/0x230 [ 1351.033513][ T1124] kill_block_super+0x4a/0x90 [ 1351.038169][ T1124] deactivate_locked_super+0x65/0xd0 [ 1351.043970][ T1124] deactivate_super+0x85/0x90 [ 1351.048637][ T1124] cleanup_mnt+0x267/0x2d0 [ 1351.053036][ T1124] __cleanup_mnt+0x15/0x20 [ 1351.057440][ T1124] task_work_run+0xae/0x130 [ 1351.061928][ T1124] exit_to_user_mode_prepare+0x156/0x190 [ 1351.067544][ T1124] syscall_exit_to_user_mode+0x20/0x40 [ 1351.072983][ T1124] do_syscall_64+0x50/0xa0 [ 1351.077394][ T1124] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1351.083384][ T1124] [ 1351.085684][ T1124] value changed: 0x04 -> 0x09 [ 1351.090338][ T1124] [ 1351.092639][ T1124] Reported by Kernel Concurrency Sanitizer on: [ 1351.098774][ T1124] CPU: 1 PID: 1124 Comm: syz-executor.3 Not tainted 5.15.0-rc1-syzkaller #0 [ 1351.107426][ T1124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1351.117469][ T1124] ================================================================== [ 1351.139491][T28875] loop5: detected capacity change from 0 to 264192 [ 1351.151160][T28875] FAULT_INJECTION: forcing a failure. [ 1351.151160][T28875] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.163868][T28875] CPU: 1 PID: 28875 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1351.172646][T28875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1351.182721][T28875] Call Trace: [ 1351.185988][T28875] dump_stack_lvl+0xd6/0x122 [ 1351.190584][T28875] dump_stack+0x11/0x1b [ 1351.194813][T28875] should_fail+0x23c/0x250 [ 1351.199336][T28875] __should_failslab+0x81/0x90 [ 1351.199530][T28880] loop0: detected capacity change from 0 to 264192 [ 1351.204140][T28875] ? ext4_fill_super+0x62/0x7840 [ 1351.204163][T28875] should_failslab+0x5/0x20 [ 1351.220266][T28875] kmem_cache_alloc_trace+0x52/0x320 [ 1351.225561][T28875] ext4_fill_super+0x62/0x7840 [ 1351.230434][T28875] ? vsnprintf+0xe8f/0xed0 [ 1351.234860][T28875] ? snprintf+0x83/0xb0 [ 1351.239036][T28875] ? set_blocksize+0x197/0x270 [ 1351.243862][T28875] mount_bdev+0x1e8/0x290 [ 1351.248195][T28875] ? ext4_mount+0x40/0x40 [ 1351.249451][T28880] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1351.252698][T28875] ? ext4_errno_to_code+0x110/0x110 [ 1351.252729][T28875] ext4_mount+0x2d/0x40 [ 1351.266115][T28880] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1351.270897][T28875] legacy_get_tree+0x70/0xc0 [ 1351.270925][T28875] vfs_get_tree+0x4a/0x1a0 [ 1351.278519][T28880] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1351.284390][T28875] path_mount+0x11ec/0x1d20 [ 1351.308351][T28875] __se_sys_mount+0x24b/0x2f0 [ 1351.313401][T28875] __x64_sys_mount+0x63/0x70 [ 1351.318055][T28875] do_syscall_64+0x44/0xa0 [ 1351.322489][T28875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1351.328723][T28875] RIP: 0033:0x467b1a [ 1351.332618][T28875] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.352340][T28875] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1351.360978][T28875] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1351.369016][T28875] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1351.377182][T28875] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1351.385138][T28875] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1351.393117][T28875] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1351.452571][T28895] loop3: detected capacity change from 0 to 264192 [ 1351.466989][T28895] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1351.480901][T28895] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1351.491704][T28895] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000005, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:05 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:05 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14008e03, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1352.863865][T28923] loop5: detected capacity change from 0 to 264192 [ 1352.869671][T28928] loop2: detected capacity change from 0 to 264192 [ 1352.878010][T28930] loop0: detected capacity change from 0 to 264192 [ 1352.885237][T28925] loop3: detected capacity change from 0 to 264192 [ 1352.900593][T28923] FAULT_INJECTION: forcing a failure. [ 1352.900593][T28923] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.913446][T28923] CPU: 0 PID: 28923 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1352.922487][T28923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.932866][T28923] Call Trace: [ 1352.936141][T28923] dump_stack_lvl+0xd6/0x122 [ 1352.940972][T28923] dump_stack+0x11/0x1b [ 1352.945311][T28923] should_fail+0x23c/0x250 [ 1352.949787][T28923] ? ext4_fill_super+0x3d/0x7840 [ 1352.954820][T28923] __should_failslab+0x81/0x90 [ 1352.959764][T28923] should_failslab+0x5/0x20 [ 1352.964334][T28923] __kmalloc_track_caller+0x6d/0x350 [ 1352.969632][T28923] ? bdev_name+0x1e1/0x240 [ 1352.974177][T28923] kstrdup+0x31/0x70 [ 1352.978083][T28923] ext4_fill_super+0x3d/0x7840 [ 1352.982884][T28923] ? vsnprintf+0xe8f/0xed0 [ 1352.987394][T28923] ? snprintf+0x83/0xb0 [ 1352.991638][T28923] ? set_blocksize+0x197/0x270 [ 1352.996486][T28923] mount_bdev+0x1e8/0x290 [ 1353.000851][T28923] ? ext4_mount+0x40/0x40 [ 1353.005287][T28923] ? ext4_errno_to_code+0x110/0x110 [ 1353.010486][T28923] ext4_mount+0x2d/0x40 [ 1353.014649][T28923] legacy_get_tree+0x70/0xc0 [ 1353.019261][T28923] vfs_get_tree+0x4a/0x1a0 [ 1353.023723][T28923] path_mount+0x11ec/0x1d20 [ 1353.028239][T28923] __se_sys_mount+0x24b/0x2f0 [ 1353.031907][T28930] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1353.033015][T28923] __x64_sys_mount+0x63/0x70 [ 1353.033044][T28923] do_syscall_64+0x44/0xa0 [ 1353.046387][T28925] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1353.050588][T28923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1353.050627][T28923] RIP: 0033:0x467b1a [ 1353.050643][T28923] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1353.055541][T28925] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 09:00:05 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1353.067853][T28923] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1353.067876][T28923] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1353.067889][T28923] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1353.067902][T28923] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1353.067915][T28923] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1353.080899][T28930] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1353.097837][T28923] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 09:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400000f, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009200, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1353.106438][T28925] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1353.107172][T28928] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1353.127989][T28930] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1353.131756][T28928] EXT4-fs (loop2): get root inode failed [ 1353.203576][T28928] EXT4-fs (loop2): mount failed 09:00:05 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1353.269841][T28959] loop0: detected capacity change from 0 to 264192 [ 1353.303626][T28959] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature 09:00:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xf, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:05 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1353.316106][T28974] loop3: detected capacity change from 0 to 264192 [ 1353.326206][T28959] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1353.344837][T28959] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1353.381649][T28982] loop2: detected capacity change from 0 to 264192 [ 1353.382298][T28984] loop5: detected capacity change from 0 to 264192 [ 1353.396506][T28982] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1353.408028][T28982] EXT4-fs (loop2): get root inode failed [ 1353.413658][T28982] EXT4-fs (loop2): mount failed [ 1353.416579][T28984] FAULT_INJECTION: forcing a failure. [ 1353.416579][T28984] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.431098][T28984] CPU: 1 PID: 28984 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1353.439871][T28984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.449957][T28984] Call Trace: [ 1353.453232][T28984] dump_stack_lvl+0xd6/0x122 [ 1353.457828][T28984] dump_stack+0x11/0x1b [ 1353.462028][T28984] should_fail+0x23c/0x250 [ 1353.466438][T28984] ? mempool_alloc_slab+0x16/0x20 [ 1353.471471][T28984] __should_failslab+0x81/0x90 [ 1353.476223][T28984] should_failslab+0x5/0x20 [ 1353.480788][T28984] kmem_cache_alloc+0x4f/0x300 [ 1353.485982][T28984] mempool_alloc_slab+0x16/0x20 [ 1353.490820][T28984] ? mempool_free+0x130/0x130 [ 1353.495922][T28984] mempool_alloc+0x9d/0x310 [ 1353.500589][T28984] ? pagecache_get_page+0x7aa/0x910 [ 1353.505777][T28984] bio_alloc_bioset+0xcc/0x530 [ 1353.510526][T28984] ? __find_get_block+0x85c/0x930 [ 1353.515615][T28984] submit_bh_wbc+0x130/0x330 [ 1353.520195][T28984] ? __getblk_gfp+0x4d3/0x590 [ 1353.524942][T28984] submit_bh+0x21/0x30 [ 1353.528995][T28984] ? __wait_on_buffer+0x60/0x60 [ 1353.533835][T28984] ext4_read_bh+0xf1/0x170 [ 1353.538238][T28984] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 1353.543664][T28984] ext4_fill_super+0x427/0x7840 [ 1353.548512][T28984] ? vsnprintf+0xe8f/0xed0 [ 1353.552992][T28984] ? snprintf+0x83/0xb0 [ 1353.557133][T28984] ? set_blocksize+0x197/0x270 [ 1353.561898][T28984] mount_bdev+0x1e8/0x290 [ 1353.566256][T28984] ? ext4_mount+0x40/0x40 [ 1353.570583][T28984] ? ext4_errno_to_code+0x110/0x110 [ 1353.575773][T28984] ext4_mount+0x2d/0x40 [ 1353.580006][T28984] legacy_get_tree+0x70/0xc0 [ 1353.584592][T28984] vfs_get_tree+0x4a/0x1a0 [ 1353.589021][T28984] path_mount+0x11ec/0x1d20 [ 1353.593521][T28984] __se_sys_mount+0x24b/0x2f0 [ 1353.598188][T28984] __x64_sys_mount+0x63/0x70 [ 1353.602768][T28984] do_syscall_64+0x44/0xa0 [ 1353.607206][T28984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1353.613195][T28984] RIP: 0033:0x467b1a [ 1353.617093][T28984] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1353.637092][T28984] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1353.645596][T28984] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1353.653634][T28984] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1353.661613][T28984] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1353.669573][T28984] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1353.677533][T28984] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1353.700632][T28984] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1353.741573][T28984] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1353.751608][T28984] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000010, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009500, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:08 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1355.886160][T29016] loop3: detected capacity change from 0 to 264192 [ 1355.893362][T29018] loop5: detected capacity change from 0 to 264192 [ 1355.900112][T29022] loop0: detected capacity change from 0 to 264192 [ 1355.911191][T29023] loop2: detected capacity change from 0 to 264192 [ 1355.944773][T29022] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1355.949869][T29018] FAULT_INJECTION: forcing a failure. [ 1355.949869][T29018] name failslab, interval 1, probability 0, space 0, times 0 [ 1355.970283][T29018] CPU: 1 PID: 29018 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1355.979167][T29018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.989215][T29018] Call Trace: [ 1355.992482][T29018] dump_stack_lvl+0xd6/0x122 [ 1355.997117][T29018] dump_stack+0x11/0x1b [ 1356.001273][T29018] should_fail+0x23c/0x250 [ 1356.005716][T29018] __should_failslab+0x81/0x90 [ 1356.010527][T29018] should_failslab+0x5/0x20 [ 1356.015019][T29018] kmem_cache_alloc_node+0x61/0x2c0 [ 1356.020211][T29018] ? create_task_io_context+0x36/0x210 [ 1356.025662][T29018] create_task_io_context+0x36/0x210 [ 1356.030943][T29018] submit_bio_checks+0x7c3/0x850 [ 1356.035867][T29018] ? mempool_alloc_slab+0x16/0x20 [ 1356.040871][T29018] ? mempool_free+0x130/0x130 [ 1356.045615][T29018] submit_bio_noacct+0x33/0x7d0 [ 1356.050568][T29018] ? bio_add_page+0x380/0x460 [ 1356.055228][T29018] submit_bio+0x10c/0x190 [ 1356.059569][T29018] submit_bh_wbc+0x2f3/0x330 [ 1356.064149][T29018] submit_bh+0x21/0x30 [ 1356.068303][T29018] ? __wait_on_buffer+0x60/0x60 [ 1356.073145][T29018] ext4_read_bh+0xf1/0x170 [ 1356.077572][T29018] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 1356.083110][T29018] ext4_fill_super+0x427/0x7840 [ 1356.087946][T29018] ? vsnprintf+0xe8f/0xed0 [ 1356.092445][T29018] ? snprintf+0x83/0xb0 [ 1356.096668][T29018] ? set_blocksize+0x197/0x270 [ 1356.101451][T29018] mount_bdev+0x1e8/0x290 [ 1356.105760][T29018] ? ext4_mount+0x40/0x40 [ 1356.110095][T29018] ? ext4_errno_to_code+0x110/0x110 [ 1356.115273][T29018] ext4_mount+0x2d/0x40 [ 1356.119561][T29018] legacy_get_tree+0x70/0xc0 [ 1356.124140][T29018] vfs_get_tree+0x4a/0x1a0 [ 1356.128618][T29018] path_mount+0x11ec/0x1d20 [ 1356.133145][T29018] __se_sys_mount+0x24b/0x2f0 [ 1356.137983][T29018] __x64_sys_mount+0x63/0x70 [ 1356.142574][T29018] do_syscall_64+0x44/0xa0 [ 1356.146984][T29018] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1356.152942][T29018] RIP: 0033:0x467b1a [ 1356.156819][T29018] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1356.176533][T29018] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1356.185013][T29018] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a 09:00:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1356.193020][T29018] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1356.200981][T29018] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1356.209068][T29018] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1356.217104][T29018] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 09:00:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x11, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1356.236489][T29016] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1356.257276][T29022] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1356.265454][T29016] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1356.281266][T29016] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1356.293625][T29022] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1356.310472][T29018] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1356.335410][T29050] loop2: detected capacity change from 0 to 264192 09:00:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140000fe, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1356.353314][T29018] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1356.373505][T29050] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1356.385134][T29050] EXT4-fs (loop2): get root inode failed [ 1356.390876][T29050] EXT4-fs (loop2): mount failed 09:00:08 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009600, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1356.393683][T29018] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x12, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1356.488040][T29073] loop0: detected capacity change from 0 to 264192 [ 1356.488432][T29074] loop5: detected capacity change from 0 to 264192 [ 1356.518387][T29079] loop3: detected capacity change from 0 to 264192 [ 1356.546928][T29073] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1356.591230][T29073] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1356.591298][T29074] FAULT_INJECTION: forcing a failure. [ 1356.591298][T29074] name failslab, interval 1, probability 0, space 0, times 0 [ 1356.613109][T29074] CPU: 0 PID: 29074 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1356.614420][T29073] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:09 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1356.621887][T29074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.621900][T29074] Call Trace: [ 1356.621907][T29074] dump_stack_lvl+0xd6/0x122 [ 1356.621931][T29074] dump_stack+0x11/0x1b [ 1356.621947][T29074] should_fail+0x23c/0x250 [ 1356.657517][T29088] loop2: detected capacity change from 0 to 264192 [ 1356.659219][T29074] __should_failslab+0x81/0x90 [ 1356.659248][T29074] should_failslab+0x5/0x20 [ 1356.676091][T29074] kmem_cache_alloc_node+0x61/0x2c0 [ 1356.681299][T29074] ? create_task_io_context+0x36/0x210 [ 1356.686925][T29074] create_task_io_context+0x36/0x210 [ 1356.692237][T29074] submit_bio_checks+0x7c3/0x850 [ 1356.697189][T29074] ? mempool_alloc_slab+0x16/0x20 [ 1356.702204][T29074] ? mempool_free+0x130/0x130 [ 1356.706872][T29074] submit_bio_noacct+0x33/0x7d0 [ 1356.711721][T29074] ? bio_add_page+0x380/0x460 [ 1356.716396][T29074] submit_bio+0x10c/0x190 [ 1356.721005][T29074] submit_bh_wbc+0x2f3/0x330 [ 1356.725792][T29074] submit_bh+0x21/0x30 [ 1356.729844][T29074] ? __wait_on_buffer+0x60/0x60 [ 1356.734752][T29074] ext4_read_bh+0xf1/0x170 [ 1356.739166][T29074] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 1356.744530][T29074] ext4_fill_super+0x427/0x7840 [ 1356.749370][T29074] ? vsnprintf+0xe8f/0xed0 [ 1356.753783][T29074] ? snprintf+0x83/0xb0 [ 1356.757928][T29074] ? set_blocksize+0x197/0x270 [ 1356.762845][T29074] mount_bdev+0x1e8/0x290 [ 1356.767253][T29074] ? ext4_mount+0x40/0x40 [ 1356.771617][T29074] ? ext4_errno_to_code+0x110/0x110 [ 1356.776860][T29074] ext4_mount+0x2d/0x40 [ 1356.781160][T29074] legacy_get_tree+0x70/0xc0 [ 1356.785795][T29074] vfs_get_tree+0x4a/0x1a0 [ 1356.790202][T29074] path_mount+0x11ec/0x1d20 [ 1356.794779][T29074] __se_sys_mount+0x24b/0x2f0 [ 1356.799641][T29074] __x64_sys_mount+0x63/0x70 [ 1356.804326][T29074] do_syscall_64+0x44/0xa0 [ 1356.808917][T29074] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1356.814910][T29074] RIP: 0033:0x467b1a [ 1356.818812][T29074] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:00:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400fffe, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1356.838673][T29074] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1356.847585][T29074] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1356.855578][T29074] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1356.863683][T29074] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1356.871668][T29074] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1356.879698][T29074] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 09:00:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009700, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1356.922186][T29074] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1356.966122][T29101] loop3: detected capacity change from 0 to 264192 [ 1356.978327][T29088] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1356.985974][T29074] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1356.990119][T29088] EXT4-fs (loop2): get root inode failed [ 1357.005051][T29088] EXT4-fs (loop2): mount failed [ 1357.010433][T29101] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1357.017156][T29074] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1357.053781][T29101] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1357.060032][T29111] loop0: detected capacity change from 0 to 264192 [ 1357.063519][T29101] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1357.089809][T29111] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1357.104418][T29111] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1357.115590][T29111] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:00:11 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:11 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009800, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x1a, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1358.922456][T29140] loop3: detected capacity change from 0 to 264192 [ 1358.929419][T29143] loop2: detected capacity change from 0 to 264192 [ 1358.933227][T29141] loop5: detected capacity change from 0 to 264192 [ 1358.945287][T29145] loop0: detected capacity change from 0 to 264192 [ 1358.959124][T29141] FAULT_INJECTION: forcing a failure. [ 1358.959124][T29141] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.971831][T29141] CPU: 0 PID: 29141 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1358.974254][T29143] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1358.980595][T29141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.980607][T29141] Call Trace: [ 1358.980614][T29141] dump_stack_lvl+0xd6/0x122 [ 1358.980638][T29141] dump_stack+0x11/0x1b [ 1358.992110][T29143] EXT4-fs (loop2): get root inode failed [ 1359.003429][T29141] should_fail+0x23c/0x250 [ 1359.003450][T29141] __should_failslab+0x81/0x90 [ 1359.003470][T29141] should_failslab+0x5/0x20 [ 1359.006735][T29143] EXT4-fs (loop2): mount failed [ 1359.011284][T29141] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 1359.046035][T29141] ? __kmalloc_node+0x30/0x40 [ 1359.050708][T29141] __kmalloc_node+0x30/0x40 [ 1359.055207][T29141] kvmalloc_node+0x81/0x110 [ 1359.059722][T29141] ext4_fill_super+0x318b/0x7840 [ 1359.064653][T29141] ? vsnprintf+0xe8f/0xed0 [ 1359.069067][T29141] ? snprintf+0x83/0xb0 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:00:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x2e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1359.073305][T29141] mount_bdev+0x1e8/0x290 [ 1359.077634][T29141] ? ext4_mount+0x40/0x40 [ 1359.081962][T29141] ? ext4_errno_to_code+0x110/0x110 [ 1359.087250][T29141] ext4_mount+0x2d/0x40 [ 1359.091404][T29141] legacy_get_tree+0x70/0xc0 [ 1359.096037][T29141] vfs_get_tree+0x4a/0x1a0 [ 1359.100454][T29141] path_mount+0x11ec/0x1d20 [ 1359.104957][T29141] __se_sys_mount+0x24b/0x2f0 [ 1359.109706][T29141] __x64_sys_mount+0x63/0x70 [ 1359.114297][T29141] do_syscall_64+0x44/0xa0 [ 1359.118729][T29141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1359.124868][T29141] RIP: 0033:0x467b1a [ 1359.128776][T29141] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.148732][T29141] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1359.157756][T29141] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1359.160329][T29145] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1359.165722][T29141] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1359.165738][T29141] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1359.165750][T29141] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1359.165763][T29141] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1359.177743][T29145] EXT4-fs (loop0): get root inode failed [ 1359.185747][T29141] EXT4-fs (loop5): not enough memory 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:00:11 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1359.193631][T29145] EXT4-fs (loop0): mount failed [ 1359.196915][T29140] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1359.257206][T29140] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1359.271592][T29140] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1359.285537][T29171] loop2: detected capacity change from 0 to 264192 [ 1359.308667][T29145] loop0: detected capacity change from 0 to 264192 09:00:11 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1359.318565][T29171] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1359.330099][T29171] EXT4-fs (loop2): get root inode failed [ 1359.335760][T29171] EXT4-fs (loop2): mount failed 09:00:11 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009900, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1359.398366][T29145] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1359.410580][T29145] EXT4-fs (loop0): get root inode failed [ 1359.416222][T29145] EXT4-fs (loop0): mount failed [ 1359.454785][T29204] loop5: detected capacity change from 0 to 264192 [ 1359.499174][T29204] FAULT_INJECTION: forcing a failure. [ 1359.499174][T29204] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.512000][T29204] CPU: 1 PID: 29204 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1359.525974][T29204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.536033][T29204] Call Trace: [ 1359.539407][T29204] dump_stack_lvl+0xd6/0x122 [ 1359.544096][T29204] dump_stack+0x11/0x1b [ 1359.548338][T29204] should_fail+0x23c/0x250 [ 1359.552755][T29204] ? mempool_alloc_slab+0x16/0x20 [ 1359.557802][T29204] __should_failslab+0x81/0x90 [ 1359.562574][T29204] should_failslab+0x5/0x20 [ 1359.567154][T29204] kmem_cache_alloc+0x4f/0x300 [ 1359.567561][T29226] loop3: detected capacity change from 0 to 264192 [ 1359.571921][T29204] mempool_alloc_slab+0x16/0x20 [ 1359.571945][T29204] ? mempool_free+0x130/0x130 [ 1359.571960][T29204] mempool_alloc+0x9d/0x310 [ 1359.571979][T29204] ? pagecache_get_page+0x7aa/0x910 09:00:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:00:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x50, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1359.597687][T29204] bio_alloc_bioset+0xcc/0x530 [ 1359.602547][T29204] ? __find_get_block+0x669/0x930 [ 1359.607663][T29204] submit_bh_wbc+0x130/0x330 [ 1359.612288][T29204] ? __getblk_gfp+0x3f/0x590 [ 1359.616997][T29204] submit_bh+0x21/0x30 [ 1359.621065][T29204] ext4_read_bh_lock+0x184/0x1b0 [ 1359.626029][T29204] ext4_fill_super+0x3662/0x7840 [ 1359.631034][T29204] ? vsnprintf+0xe8f/0xed0 [ 1359.635462][T29204] ? snprintf+0x83/0xb0 [ 1359.639630][T29204] mount_bdev+0x1e8/0x290 [ 1359.643950][T29204] ? ext4_mount+0x40/0x40 [ 1359.648449][T29204] ? ext4_errno_to_code+0x110/0x110 [ 1359.653750][T29204] ext4_mount+0x2d/0x40 [ 1359.657917][T29204] legacy_get_tree+0x70/0xc0 [ 1359.662498][T29204] vfs_get_tree+0x4a/0x1a0 [ 1359.667128][T29204] path_mount+0x11ec/0x1d20 [ 1359.671986][T29204] __se_sys_mount+0x24b/0x2f0 [ 1359.676709][T29204] __x64_sys_mount+0x63/0x70 [ 1359.681493][T29204] do_syscall_64+0x44/0xa0 [ 1359.686640][T29204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1359.692617][T29204] RIP: 0033:0x467b1a [ 1359.696560][T29204] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.716241][T29204] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1359.724651][T29204] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1359.732612][T29204] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1359.740577][T29204] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1359.748597][T29204] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1359.756737][T29204] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1359.771399][T29226] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1359.787168][T29237] loop2: detected capacity change from 0 to 264192 09:00:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="645384103cf67ce0373b1c0700aeb126b05f0000070000010027a9540042f049df354de4df85b47c89e46dcc862489", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1359.818988][T29237] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1359.830511][T29237] EXT4-fs (loop2): get root inode failed [ 1359.836667][T29237] EXT4-fs (loop2): mount failed [ 1359.857292][T29246] loop0: detected capacity change from 0 to 264192 09:00:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1359.862314][T29226] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1359.876900][T29246] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1359.903343][T29246] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1359.911664][T29204] EXT4-fs error (device loop5): ext4_fill_super:4810: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 1359.913024][T29226] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1359.944144][T29204] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1359.944598][T29246] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x64, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:12 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x8, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1359.965740][T29204] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009a00, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1360.038002][T29266] loop2: detected capacity change from 0 to 264192 [ 1360.050504][T29266] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1360.062049][T29266] EXT4-fs (loop2): get root inode failed [ 1360.067761][T29266] EXT4-fs (loop2): mount failed 09:00:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) 09:00:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0xfe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d61eeef53854c", 0x2a, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1360.132203][T29285] loop5: detected capacity change from 0 to 264192 [ 1360.142571][T29285] FAULT_INJECTION: forcing a failure. [ 1360.142571][T29285] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.151655][T29286] loop0: detected capacity change from 0 to 264192 [ 1360.155346][T29285] CPU: 1 PID: 29285 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1360.170645][T29285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.180746][T29285] Call Trace: [ 1360.184023][T29285] dump_stack_lvl+0xd6/0x122 [ 1360.188758][T29285] dump_stack+0x11/0x1b [ 1360.192962][T29285] should_fail+0x23c/0x250 [ 1360.197459][T29285] ? prealloc_shrinker+0xae/0xe0 [ 1360.202381][T29285] __should_failslab+0x81/0x90 [ 1360.207225][T29285] should_failslab+0x5/0x20 [ 1360.211717][T29285] __kmalloc+0x6f/0x350 [ 1360.215933][T29285] prealloc_shrinker+0xae/0xe0 [ 1360.220682][T29285] register_shrinker+0x18/0xf0 [ 1360.225469][T29285] ext4_es_register_shrinker+0x19e/0x1f0 [ 1360.231263][T29285] ext4_fill_super+0x43ad/0x7840 [ 1360.236244][T29285] mount_bdev+0x1e8/0x290 [ 1360.240695][T29285] ? ext4_mount+0x40/0x40 [ 1360.245092][T29285] ? ext4_errno_to_code+0x110/0x110 [ 1360.250288][T29285] ext4_mount+0x2d/0x40 [ 1360.254428][T29285] legacy_get_tree+0x70/0xc0 [ 1360.259010][T29285] vfs_get_tree+0x4a/0x1a0 [ 1360.263415][T29285] path_mount+0x11ec/0x1d20 [ 1360.267960][T29285] __se_sys_mount+0x24b/0x2f0 [ 1360.272634][T29285] __x64_sys_mount+0x63/0x70 [ 1360.277214][T29285] do_syscall_64+0x44/0xa0 [ 1360.281979][T29285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1360.287864][T29285] RIP: 0033:0x467b1a [ 1360.291743][T29285] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.311881][T29285] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1360.320296][T29285] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1360.328254][T29285] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1360.336210][T29285] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1360.344311][T29285] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1360.352288][T29285] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1360.366388][T29287] loop3: detected capacity change from 0 to 264192 [ 1360.411930][T29287] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1360.426202][T29287] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1360.438323][T29286] EXT4-fs error (device loop0): ext4_fill_super:4810: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1360.454335][T29303] loop2: detected capacity change from 0 to 264192 09:00:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) [ 1360.461232][T29286] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1360.466128][T29287] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 09:00:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009b00, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) 09:00:12 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000004, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000002400026742c1f05c606d", 0x24, 0x8c80}], 0x0, &(0x7f0000000040)) [ 1360.517317][T29286] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1360.521821][T29303] EXT4-fs error (device loop2): __ext4_iget:4850: inode #2: block 19589: comm syz-executor.2: invalid block [ 1360.539654][T29303] EXT4-fs (loop2): get root inode failed [ 1360.545298][T29303] EXT4-fs (loop2): mount failed [ 1360.608471][T29322] loop5: detected capacity change from 0 to 264192 [ 1360.622804][T29325] loop3: detected capacity change from 0 to 264192 [ 1360.628900][T29322] FAULT_INJECTION: forcing a failure. [ 1360.628900][T29322] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.643050][T29322] CPU: 0 PID: 29322 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 1360.651808][T29322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.661947][T29322] Call Trace: [ 1360.665301][T29322] dump_stack_lvl+0xd6/0x122 [ 1360.669882][T29322] dump_stack+0x11/0x1b [ 1360.674075][T29322] should_fail+0x23c/0x250 [ 1360.678480][T29322] ? mb_cache_create+0xb9/0x350 [ 1360.683318][T29322] __should_failslab+0x81/0x90 [ 1360.688080][T29322] should_failslab+0x5/0x20 [ 1360.692569][T29322] __kmalloc+0x6f/0x350 [ 1360.696707][T29322] ? kmem_cache_alloc_trace+0x221/0x320 [ 1360.702421][T29322] ? mb_cache_create+0x40/0x350 [ 1360.707258][T29322] mb_cache_create+0xb9/0x350 [ 1360.711924][T29322] ext4_xattr_create_cache+0xf/0x10 [ 1360.717147][T29322] ext4_fill_super+0x526f/0x7840 [ 1360.722077][T29322] mount_bdev+0x1e8/0x290 [ 1360.726401][T29322] ? ext4_mount+0x40/0x40 [ 1360.730799][T29322] ? ext4_errno_to_code+0x110/0x110 [ 1360.735980][T29322] ext4_mount+0x2d/0x40 [ 1360.740119][T29322] legacy_get_tree+0x70/0xc0 [ 1360.744763][T29322] vfs_get_tree+0x4a/0x1a0 [ 1360.749171][T29322] path_mount+0x11ec/0x1d20 [ 1360.753664][T29322] __se_sys_mount+0x24b/0x2f0 [ 1360.758582][T29322] __x64_sys_mount+0x63/0x70 [ 1360.763160][T29322] do_syscall_64+0x44/0xa0 [ 1360.767613][T29322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1360.773524][T29322] RIP: 0033:0x467b1a [ 1360.777403][T29322] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.797065][T29322] RSP: 002b:00007f28bfd50fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1360.805463][T29322] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000467b1a [ 1360.813416][T29322] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f28bfd51000 [ 1360.821380][T29322] RBP: 00007f28bfd51040 R08: 00007f28bfd51040 R09: 0000000020000000 [ 1360.829420][T29322] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1360.837460][T29322] R13: 0000000020000100 R14: 00007f28bfd51000 R15: 0000000020000040 [ 1360.845455][T29322] EXT4-fs (loop5): Failed to create ea_block_cache [ 1360.870347][T29325] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 1360.883548][T29325] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1360.894014][T29325] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none.