g#6443 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 126.793787][ T22] audit: type=1400 audit(1635499137.388:291): avc: denied { create } for pid=362 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 126.815986][ C1] sd 0:0:1:0: tag#6443 CDB: opcode=0xe5 (vendor) [ 126.816003][ C1] sd 0:0:1:0: tag#6443 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 126.816018][ C1] sd 0:0:1:0: tag#6443 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 126.816033][ C1] sd 0:0:1:0: tag#6443 CDB[20]: ba [ 126.848624][T18773] loop5: detected capacity change from 0 to 264192 [ 126.864939][T18771] tmpfs: Unsupported parameter 'huge' [ 126.874970][T18773] FAT-fs (loop5): bogus sectors per cluster 6 [ 126.876938][ T5609] loop3: p2 < > p4 [ 126.882970][T18773] FAT-fs (loop5): Can't find a valid FAT filesystem [ 126.888839][T18764] loop0: p2 < > p4 [ 126.895045][T18768] loop4: p2 < > p4 [ 126.899200][ T5609] loop3: p4 size 2097152 extends beyond EOD, [ 126.906211][T18767] loop1: detected capacity change from 0 to 264192 [ 126.908550][ T5609] truncated [ 126.912934][T18768] loop4: p4 size 2097152 extends beyond EOD, [ 126.925088][T18764] loop0: p4 size 2097152 extends beyond EOD, [ 126.927993][T18768] truncated [ 126.943273][T18764] truncated 09:18:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) fstat(r0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7, 0xcc, 0xff, 0x6, 0x0, 0x10000, 0xa0010, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x3, 0xc9}, 0x2000, 0x2, 0xaf8, 0x7, 0xeb0f, 0x8, 0xe0, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x3) fsopen(&(0x7f0000000400)='tracefs\x00', 0x0) 09:18:57 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7a00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 126.944185][ T380] loop3: p2 < > p4 [ 126.950942][T18774] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 126.967807][T18767] loop1: p2 < > p4 [ 126.972976][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 126.981690][T18767] loop1: p4 size 2097152 extends beyond EOD, truncated 09:18:57 executing program 4: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(0xffffffffffffffff) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f00000000c0)) r6 = dup(r4) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="91247bd020ad8c0b4ee539ff3d01200000010006001c000000000000e0020000000254e148000000e2d5d2b24f177f5b9a6840407428fb4271bd60f6a38ee0bd4be89633327a1c5673a7b96021dca13c0719311cc002a82c9d9656c726855f647a32853e6f6757d44149097e9d61d1810690d76fcd0afe49ceb5242909497ac6050000004907bb3fcdac01ca5b4741e04ecee1528b7cd117bc1e7c135661120281", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 126.999425][T18776] tmpfs: Unsupported parameter 'huge' [ 127.008765][T18774] loop5: detected capacity change from 0 to 264192 [ 127.009482][T18678] loop3: p2 < > p4 [ 127.021036][T18778] loop0: detected capacity change from 0 to 264192 [ 127.023518][T18774] FAT-fs (loop5): bogus sectors per cluster 6 [ 127.033636][T18774] FAT-fs (loop5): Can't find a valid FAT filesystem [ 127.041262][T18678] loop3: p4 size 2097152 extends beyond EOD, truncated 09:18:57 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfbffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 127.045478][ C0] sd 0:0:1:0: tag#6444 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 127.057975][ C0] sd 0:0:1:0: tag#6444 CDB: opcode=0xe5 (vendor) [ 127.064354][ C0] sd 0:0:1:0: tag#6444 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 127.073434][ C0] sd 0:0:1:0: tag#6444 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 127.082514][ C0] sd 0:0:1:0: tag#6444 CDB[20]: ba [ 127.089047][T18780] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 09:18:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) fstat(r0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7, 0xcc, 0xff, 0x6, 0x0, 0x10000, 0xa0010, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x3, 0xc9}, 0x2000, 0x2, 0xaf8, 0x7, 0xeb0f, 0x8, 0xe0, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x3) 09:18:57 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdfdffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x2d, 'memory'}, {0x2b, 'memory'}, {0x2d, 'net_prio'}, {0x2d, 'memory'}, {0x2b, 'net_cls'}, {0x2b, 'cpu'}, {0x2b, 'memory'}, {0x2b, 'perf_event'}, {0x2d, 'io'}, {0x2b, 'cpuacct'}]}, 0x51) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x7) open$dir(&(0x7f0000000000)='./file0\x00', 0x181000, 0x4) 09:18:57 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) dup(r1) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ftruncate(r2, 0x767) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="1000000000003e76796077a28283400001000016010000ec1b00000000000000271958f8edbf487706b6a77582ed37332ff4eb4439cf05fc661c551d9e860e2f745623259572f3f7d24d94d34fe1ce69b76068712a52a894838189a34ff58ec3b3a8155d44f208a6450eb8a6c0e6b4039f3b076c82069686dd8a4af8db84099395c442ab815964281e98d0d7626fb807b6fc5b0022ce9d66dd890471cc724acf", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180), 0x0) [ 127.097974][T18778] loop0: p2 < > p4 [ 127.102320][T18778] loop0: p4 size 2097152 extends beyond EOD, truncated [ 127.116126][T18785] tmpfs: Unsupported parameter 'huge' [ 127.131549][T18782] loop3: detected capacity change from 0 to 264192 [ 127.143207][T18787] loop1: detected capacity change from 0 to 264192 09:18:57 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000100)=[{0x54}, {0x3c, 0x0, 0x0, 0x8}, {0x6}]}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x8, &(0x7f0000000000)=[{0x5, 0x2, 0xfc, 0x1000}, {0x9, 0x80, 0x9, 0x5}, {0x0, 0x6, 0xff, 0x5}, {0xb113, 0xa8, 0x7f, 0x1}, {0x3, 0x3b, 0x3f, 0x81}, {0xfffd, 0x1f, 0x5, 0xffff5ef5}, {0xf795, 0x0, 0x2f, 0x4d}, {0x3, 0x3, 0xfe, 0x9}]}) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xc0402, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = geteuid() setreuid(r3, 0x0) r4 = geteuid() setreuid(r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x20, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0x80000001}}, {}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}, {@access_user}, {@posixacl}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r3}}, {@cache_mmap}, {@cachetag={'cachetag', 0x3d, '-\x8a![+#-'}}], [{@context={'context', 0x3d, 'user_u'}}, {@hash}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure}, {@obj_type={'obj_type', 0x3d, '-'}}, {@obj_type={'obj_type', 0x3d, '\x06\x00&\x00'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_eq={'uid', 0x3d, r4}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) epoll_wait(r2, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x0) [ 127.155539][ T22] audit: type=1400 audit(1635499137.778:292): avc: denied { mounton } for pid=18788 comm="syz-executor.4" path="/root/syzkaller-testdir823828776/syzkaller.VNlHQs/356/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 127.189496][T18782] loop3: p2 < > p4 [ 127.193541][T18787] loop1: p2 < > p4 [ 127.197853][T18782] loop3: p4 size 2097152 extends beyond EOD, truncated 09:18:57 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7b01000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:57 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xf6, 0x7f, 0x1, 0xff, 0x0, 0x7, 0x600, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000000c0), 0x6}, 0x0, 0x7f, 0x3f, 0x9, 0x7, 0x8, 0x80, 0x0, 0x1, 0x0, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x2) write(0xffffffffffffffff, &(0x7f0000000240)="bd94c7249ae98e4386007a63d07be291b70c07953bb7863bfdaf0b72fa2f11e02e1e8f84185e6022357b6d1b8a3ad41b2079d9e1c04172b6a5af7c15806724d31d573f616e4a76cb0b4a052d88691a0bc15d013567d39092ca55047fdb37b287caec604ffe534059f5c48f9c8772c2c4c91922", 0x73) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) fstat(r0, &(0x7f0000000380)) [ 127.206190][T18787] loop1: p4 size 2097152 extends beyond EOD, truncated [ 127.215402][ T22] audit: type=1326 audit(1635499137.838:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18796 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x0 [ 127.242282][T18799] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 09:18:57 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:57 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 127.254935][T18802] loop0: detected capacity change from 0 to 264192 [ 127.269233][T18803] tmpfs: Unsupported parameter 'huge' [ 127.289099][T18802] loop0: p2 < > p4 [ 127.294481][T18809] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 09:18:57 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdfdffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:57 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000780)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 127.301160][T18807] loop1: detected capacity change from 0 to 264192 [ 127.316533][T18802] loop0: p4 size 2097152 extends beyond EOD, truncated [ 127.334991][T18815] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 127.341210][T18813] loop3: detected capacity change from 0 to 264192 09:18:58 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x10000020, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:58 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7fffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 127.367105][T18818] tmpfs: Unsupported parameter 'huge' [ 127.378791][ T3246] loop1: p2 < > p4 [ 127.383935][ T3246] loop1: p4 size 2097152 extends beyond EOD, truncated [ 127.392313][T18822] loop0: detected capacity change from 0 to 264192 [ 127.392383][T18813] loop3: p2 < > p4 [ 127.413605][T18807] loop1: p2 < > p4 09:18:58 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1f, 0x0, 0x1, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) dup3(r2, r3, 0x0) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0002, 0x6}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000780)={0x154, 0x0, 0x200, 0xffffff3b, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x9}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x80}, {0x6, 0x11, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1f}, {0x6, 0x11, 0x2d}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x9}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8}, {0x6, 0x11, 0x3}}]}, 0x154}, 0x1, 0x0, 0x0, 0x24040081}, 0x1) [ 127.416563][T18813] loop3: p4 size 2097152 extends beyond EOD, truncated [ 127.417884][T18807] loop1: p4 size 2097152 extends beyond EOD, truncated [ 127.431942][T18822] loop0: p2 < > p4 [ 127.438337][T18822] loop0: p4 size 2097152 extends beyond EOD, truncated 09:18:58 executing program 4: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xf6, 0x7f, 0x1, 0xff, 0x0, 0x7, 0x600, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000000c0), 0x6}, 0x0, 0x7f, 0x3f, 0x9, 0x7, 0x8, 0x80, 0x0, 0x1, 0x0, 0x80}, 0x0, 0x1, 0xffffffffffffffff, 0x2) write(0xffffffffffffffff, &(0x7f0000000240)="bd94c7249ae98e4386007a63d07be291b70c07953bb7863bfdaf0b72fa2f11e02e1e8f84185e6022357b6d1b8a3ad41b2079d9e1c04172b6a5af7c15806724d31d573f616e4a76cb0b4a052d88691a0bc15d013567d39092ca55047fdb37b287caec604ffe534059f5c48f9c8772c2c4c91922", 0x73) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:58 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x7f, 0x81, 0x7c, 0x0, 0x80000001, 0x1, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x80000000, 0x7}, 0x10, 0x8400000000000000, 0x20, 0x0, 0x80, 0x3, 0x100, 0x0, 0x9, 0x0, 0xb5b9}, r0, 0x7, r5, 0x2) 09:18:58 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfeffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:58 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:58 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x80ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 128.041248][ T22] audit: type=1326 audit(1635499138.668:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18796 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x0 09:18:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x81, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000002b80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r4 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r3, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000040)=0x3) [ 128.109522][T18831] loop3: detected capacity change from 0 to 264192 [ 128.118979][T18840] loop1: detected capacity change from 0 to 264192 [ 128.126113][T18835] tmpfs: Unsupported parameter 'huge' [ 128.131763][T18834] loop0: detected capacity change from 0 to 264192 09:18:58 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) r6 = getpgid(r0) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x3f, 0x22, 0x9, 0x5, 0x0, 0x1, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x6}, 0x808, 0x2, 0x3, 0x5, 0x40, 0x7fffffff, 0x8001, 0x0, 0x7ff, 0x0, 0x3}, r6, 0xb, r1, 0x1a) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 128.157643][T18831] loop3: p2 < > p4 [ 128.162039][T18831] loop3: p4 size 2097152 extends beyond EOD, truncated [ 128.169937][ T4668] loop0: p2 < > p4 [ 128.173961][ T4660] loop1: p2 < > p4 [ 128.180418][ T4668] loop0: p4 size 2097152 extends beyond EOD, truncated [ 128.180836][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 128.202560][T18847] tmpfs: Unsupported parameter 'huge' 09:18:58 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfeffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:58 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xb11, 0x101400) r1 = getuid() r2 = geteuid() setreuid(r2, 0x0) write$P9_RSTATu(r0, &(0x7f0000000040)={0x50, 0x7d, 0x2, {{0x0, 0x39, 0x5, 0x1, {0x1, 0x0, 0x2}, 0x200000, 0x8, 0xffff, 0x8, 0x1, '/', 0x2, '}$', 0x0, '', 0x3, '!-%'}, 0x2, '.%', r1, 0x0, r2}}, 0x50) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0x0, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x141801, 0x0) write$P9_RLOCK(r4, &(0x7f0000000700)={0xfd10, 0x35, 0x0, 0x2}, 0x8) r5 = socket$inet6(0x10, 0x80000, 0x0) sendto$inet6(r5, &(0x7f0000000300)="900000001c001f4d154a817393278bff0a808f7802020000ec36710014000100ac1414bb0542d6401051a2d708f37ac8da1a29760099c5ac0000c5b068d0bf46d3234565778d8757006113ffaf6c3efed495a46215be0000766426c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b001500de1df32c1739d7fbee9aa241fa18e9e0b39010d7cebf6f2cdabb54", 0x90, 0x0, 0x0, 0x0) r6 = openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r6, 0x80106720, &(0x7f0000000680)={0x6, &(0x7f00000005c0)=[{0x0, 0x97, &(0x7f0000000140)="d77e0f1daa9852674b3b2ed0770b602ebe5bbd2118dfa673e07f9fb29083e6207e900978a05f08667703907edb52524682e1592765a1777358d87275d5026281bfeb04113663180fdcc63507b12b264a7abffd3214b63696b370649fb750518a4455461dc8b6d53bdec133c991b373c18cc5c989201558ca336f18c4944c6aa178244809e42d28ac70fc8bd2dee25ae013eb0a74abfa9a", 0x1}, {0x2, 0x8f, &(0x7f0000000200)="bb46ecd6897c9f7dcc2fdd0b7e3da8aa59a2a09d41995546a06e2a324ced5bec0d3052328cc78f3b9537d2d48523aa33fbc4b4352081d983b230451fdd68050d53acbdfc78cec2fb2443a16691483d3e1ca4de9b1a9c56e52a23be89f94a9bf45237d4d831da67953297cbc81912d3ec5c17246d0d9bf99330ff9b0e52a037565e26598fbe877cb9f3f18138465be5", 0x1, 0x1}, {0x1e62, 0x9d, &(0x7f00000003c0)="e8a483aab9139dc445fb6237e1789ca15d488ffc7b4522fb367791edb71b02aaf4314290e774d7bc6299d6784fc604a40dcc68924a0f0ec6750affc8df2e58d3f2ac0fb7b018e73e72cecf494f779ad8f07592af6ffa5700789fad75cb881463e8077fb2dbdc2463dd753e26c793dd9e3cde430c7199b9489abfb9af7b9b52f6dc9c9cabf8bce72750bc56a03c1aaa251bb7513779ce60cb2ca781e1d4"}, {0x6, 0x3e, &(0x7f00000002c0)="3c5f94fd203100039f631a6dd07623e997aac9c734978aa316252643c3b25605214955eb167ecd3a90f53e9bcfd7d2a857a52dea71b42c944bb835036e31", 0x0, 0x1}, {0x3efd, 0xbd, &(0x7f0000000480)="9270727e0ae77d10b00193fb74059d1ddd2481eaf3e8de478bab754254190dd034e0e7dd8c180607db74e157f398a9cd5d8fe32a93e3d314cd95554c6c1277d8572c7ca79e4a43e49d5691a7ce31656956a1b0ab6521e5ba1299a72a76df05ad6787779f257c44db9645d1bf75d2c12c011ec7d44da736022c6768b9239207dc9dcebc6070a8d4c0e55b450e6449d9c4d3658566f56131f7625e604c98c53bcd64c61b21a6893019d3af73b6371b2cdc6e00ce792924ba7e7f3d71cefa", 0x1}, {0x444a, 0x75, &(0x7f0000000540)="31e0eab69351760fa0b1f22e79a71ea2455c76252d116f54fa7ddc5369e21f91360517fee87a234b9a93957526662f0e101d94b14df09f7e2277ffd9374e0e99a73d623bd3c01cf4bea0917014f8591bcd4f747922763d5c67ecf92c4b0555eb27129a37da0fefaa94d0002b84e972e81b608d08bf"}]}) [ 128.224542][T18840] loop1: p2 < > p4 [ 128.232085][T18834] loop0: p2 < > p4 [ 128.232604][T18840] loop1: p4 size 2097152 extends beyond EOD, truncated [ 128.247575][T18834] loop0: p4 size 2097152 extends beyond EOD, truncated 09:18:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:58 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x81ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:58 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000001180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000880)=[{&(0x7f00000001c0)="21e2d393fa6b235434034438c9818db93a40125bdfe8f2cb83226d0cf4bf43b2a785c9ecbe38c21091b9c317cecedfa1cda38dabb1abd3a3fc0f7f", 0x3b}, {&(0x7f00000002c0)="6d03dd31b175b7d51cbbf6efcd318abd44ffab5b1aea42de83c4c8f6c5a5", 0x1e}, {&(0x7f0000000300)="17dbe6eb3567b65c5c01621b4b8476cf416042fe37cd5316b5bf96b558d3b15609f806162c950702c7ebd721d4c07f7590b5260a498e86217e8ea3441a4cbd0ecd66d89386ff0248ddb409656bc7d6bb24f483ae49c2fb2413af69b6e247918acbf07c5e105ff91d93e938a57f", 0x6d}, {&(0x7f0000000600)="23c224deb0a7edd248ac282cf5cf6d5acb54600009bbf10788b92e788edee0acaa568df31f7828f5cfff3a6fbe7b064988dbb129e665eca61f12db31d789cf5f2ace079219de4e38d1e95620c79d87d41b8608ca9310c85015e8c6be43a2cc077d9cc53443cc00a58f0d37a314926de22a96b94aa446262cba6a977562e6eaa28f46f499b4d2cd5680b269a7a7d15d6e7bbd0577aefb2a48937dce1ebe490038612c503be659431e5616dd12bbbdd1430762978fd30b600277e86cd41205", 0xbe}, {&(0x7f0000000780)="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", 0xfc}], 0x5, 0x0, 0x0, 0x800}}, {{&(0x7f0000000900)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f00000006c0)="01cafc05f92fae2d3b5b7fe943ff2f9201262607c6ceec13ea631e0828f62638727d25cbb6279385d3986f3ae1d3", 0x2e}, {&(0x7f0000000980)="ee1cc5f05af00f49cb11a2ac7e09c87f549e190924016e98fa75e5ab24bfaf6b7dca9face7af75417f38caef07098100f10499489290708a0f0a2bbaae2b48930750e186423a48183b2b0bdb14a41fce006432348c8044b4644f18bc2498b9f260f7bf711301967693a6b773e7ae2b1876ec153bc4f0fda49c931f9318ce90b9d2f1347a5cb850edc2eae5209dd46a6e2e9ac1298ebafac06837c938d1f4cc043367", 0xa2}], 0x2, &(0x7f0000000e40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r1, 0xffffffffffffffff, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x70, 0x4}}, {{&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000f40)="55bdd0d40f23728b519faf214873981b87c2de486132adc376187b6119da8e5bf30964fe2591563848a87e79e7d4f9adab186f26c5d0869d728a307dfbd47be654d6d2b133995e4244ad7b556a582e41cfe924aa76fd8f6007f7ce1e748c811fef27dc54fa06be1834751b05f8341af2291548e4a80834ca20379aca8b1bd7882529a58e55db5e8de387419f9f5518adbe400a7f4683bc58916f63a2caba343542233a", 0xa3}, {&(0x7f0000001000)="303cfcd17d86872de93513850f1bef7cdcd707162c0e3622bda74f1e38b16c564633301a8219665277f071636ef8b8582738bef193ca5d6b491a000dcf99ad606e30656aa3fb475e07e7b21901c8d87898da1d06d0585a7fd58729edc22c0c940bcd95e2564a2d5be3e8216e1866a8f2b1e6be362a3f9b9c5e220adf346b55804eea3fa8a69e266eb4ce33ffd5", 0x8d}, {&(0x7f00000010c0)="4768e7c8353a6e86b0f305d2a9fc4a335aba56f5ec5cd166b6f5162903d7fa960d0e1b59be239f7826f975cb2e7d560a8e0a", 0x32}], 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="2000000000000000005f9a912b4111b0986b03de205e102d140e7e539b026abf5900f7e1bd2190fe635e12a41da11077bb9bbc973c259b1b86769a4030dd8fb40a5a50ae67d3b36e72a1c92162ed43d07fbf80fb73094b612e2a1ccef1a06ae5cfb3367e8f317c8a97997493e7cfd16a01389b1468bf42e8d13abefc750f04dd7ccca39871c0043211dc2d4e2e4f1e47879cd795b81633d58f129eb3b3542c27cdfe3b8d3dc0bcead1150dfd9ee2286342df7733919ec223cc728fab0cda9f00a5f7a66c653253a450", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1], 0x40, 0x1}}, {{&(0x7f0000001200)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000002700)=[{&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000001340)="38ed5197f2477ba480a4ac18b658603af6aa788e12ec3e18d268150220fd19d68814131c238cb42a450ce019f223c7a7960262ccf43034009fb2f7e2e2bd44536e68f53a951be04abbe36d943e0ccc511e49a8beddb0f012eeadf4831fe39e9382c4120a776a5747cbc673d2807b196496c74d3526903cd13d3a1cbf07ab78d69fbad97321f0ca678f6b02af8786a3e6721437de19dd58a48087d0be7cc6964119bf6d7a37bc1baab2ff0c0a6105171da10885eaf2c7eb7f00726194a349a4611c130389266ed390332b9882c27bcf30518444836d39626eb854c7667c6928be2d2aec770f6d9fe9", 0xe8}, {&(0x7f0000001480)="b5aa9d1c004ded7b3aee78c21bdf961ff7d2b803", 0x14}, {&(0x7f0000001500)="80e50dcfd375695101aaba342c03c09b8725782284a232241e8aaf9cda0d8841d64631522591effe3011e752c7fde6438cd6367fa7d0285c71566d7afbe6be8e05584c9cf7c331b4e767b2990b02bc8189f605f4cdcb7444876c92e2bf25ada4cc41d4485ffe9d9c0ecd36d80a6f229e9b8e0369a032b8764e3dc95323d926f3e1f714e32968e6c3f49a6b25652a93ebca4441a24ac7", 0x96}, {&(0x7f0000002600)="d4c48f863120bf41801af49586e18e6934adfe3b1be3f60c8f0e3f909926bfaac6f84c02a4b6a8facdd35cd7d362939456f2e8ba461e6e9c30c596d4f30ff5951b6d90498785b92248437606efc982b416f972f09ae3342f1798c4bfa2bc1601e72cb3ddb6fa11804160e22db8bb394d56c684b2a032f568c2a8fa636edb1125530139afb45691fb86df7a19e6f696f8a6db1e4ea2b62061526548a3e3199984b102463aaf5b5bca9d71b9af7b7ebbe09b297a6d67baa82ff0e97468c30b52e4adfc608244ef0e197b3e81994d70205d3dc5f31db5cf2633df2d12603167b39f2ecb4faf938436bbbf1bb794", 0xec}], 0x5, 0x0, 0x0, 0x20008000}}], 0x4, 0x4008081) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000b80)={0x0, 0x0, 0x21, 0x2, @scatter={0x3, 0x0, &(0x7f00000000c0)=[{&(0x7f0000003880)=""/4099, 0x1003}, {&(0x7f0000000c40)=""/70, 0x46}, {&(0x7f0000000cc0)=""/100, 0x64}]}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r5 = socket$inet(0x2, 0x3, 0x1) r6 = dup(r5) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:58 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xff0f0000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 128.281545][T18852] loop3: detected capacity change from 0 to 264192 [ 128.308731][ T5609] loop3: p2 < > p4 [ 128.312961][ T5609] loop3: p4 size 2097152 extends beyond EOD, truncated 09:18:59 executing program 4: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6d706f6c3d696e7465726c656176653d72656c61746176653a002d0a83c3155310d14d723a3a02fb8b15a69bf73a7b5dbe07c2bd3d1c59d6787982cee3e74da9e64e915c824a607766c1cbde83f5fc2da19e1e8423388b9bcfb77997f2959a87ff7b56cd8c1ce214b2683db790b455f82b70d4271363ace7b4f0d2e9d6f9dcff"]) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, 0x0) fstat(r1, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="ffab130468a228eecf683005acf503d4de74e9cf6298ce4ccfc4239059ae818a26f1304a82ebd014a62125cf408fe96bd77f308073daf0ff03abe243f504ca724eeaed7d38", 0x45}], 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000c6c600bc88addb973436b2b14bd1ac0690f9d3e5348997345d0f7aa434bfb05fc544e83901ce89cb49f11e0070bca1e7fb0893bdc55cb6fcb711cbeba03034973779c8c255309a75820724b4009d491cb358f3565e6ee09fb8125d3d583ba1274f66208e643a9121c4a0b95d06467751612d5164bf51cc997f07f4d5d41e00e0863a7ba2be94285d8f86b9188d9880a96f07f5c62238540b9ebc53945f4db948300dd072d3551eb45b7f", @ANYRES32, @ANYBLOB="0000000028000000000000000100000001", @ANYRES32=r3, @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x20040810}, 0x0) r6 = getpgid(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc, 0x10000000}, 0xc, &(0x7f0000000100)=[{&(0x7f0000000280)={0x74, 0x2b, 0x100, 0x70bd2a, 0x25dfdbfb, "", [@generic, @typed={0x4, 0x93}, @generic="c6edbd9ec58a06b8992d95d451711b22db63565831e25fe96cb1f774b1ac93982fc59eeb82a144bab9c3e2f64693aaa9e0e164556ebe49ae828f740c1ffe409b4bc2a35c9da201b3091dfbc744fba4a546639170", @typed={0xa, 0x1b, 0x0, 0x0, @str='tmpfs\x00'}]}, 0x74}, {&(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x11d8}], 0x2, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee00}}}], 0x40, 0x404c000}, 0x44000054) [ 128.330830][T18859] tmpfs: Unsupported parameter 'huge' [ 128.342733][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 128.342794][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f00000001c0), 0x0, 0x2400) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0)={0x3, 0x1, 0x20, 0x7fff, 0x1}, 0xc) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r5 = socket$inet(0x2, 0x3, 0x1) r6 = dup(r5) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="100000000000000101000000010000001c574e000000000001000000000000006b578cd74be669ac2841987bdd3db230ba21fc15e0cfee2f18aa970100008000000000314b8f19afefe78728b94ecfcfe01ec3c2be73c0da5ab1033d4f674426066f9a8d2f8f01781859efbb5ae458dfc631b253efd4f5e7009ec0b0fcbb303580a7ef27dd157be12dd542981d19f69a43eb90c860f47a3706cc5ac266fe3537232bc5e33a60ffd891dcbad4dbfd130cb7a819626aee3e0678224c187728c3336177d1ca80dae3176861af42b9f3a8a2436f98beaced7a5e82a66f2c8e2b5585b47d273865c8c17257bf706f9810b640eb173b9ebc817fd7", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:59 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {0x1d}]}) r1 = geteuid() setreuid(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0xa, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',uname=!--,audit,fscontext=user_u,fowner<', @ANYRESDEC=r1, @ANYBLOB="2c6673636f6e746578748953fc7991343d756e636f6e66696e65645f752c61756469742c736d61636b6e73726ff7743d2c636f6e746578743d73797361646d5f752c646f6e745f61707072616973652c736d61636b66737472616e736d7574653d262b2d272c00"]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x3, 0x4, 0x4b, 0x6}, {0x8001, 0x6, 0x5, 0x1}, {0x6, 0xff, 0x6, 0x1}, {0x8, 0x80, 0x45, 0x2}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xfb, 0x6, 0x4, 0x8}, {0x6, 0x71, 0xbe, 0x1}, {0xf086, 0x4, 0x2, 0x7ff}]}) setresuid(r1, 0xee01, 0xffffffffffffffff) [ 128.378254][T18863] loop1: detected capacity change from 0 to 264192 [ 128.387775][T18852] loop3: p2 < > p4 [ 128.406730][T18868] loop0: detected capacity change from 0 to 264192 [ 128.411772][T18852] loop3: p4 size 2097152 extends beyond EOD, truncated 09:18:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:59 executing program 4: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {r1, r2+60000000}}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) rt_sigtimedwait(&(0x7f0000000200)={[0xfffffffffffffce2]}, 0x0, 0x0, 0x8) [ 128.431251][T18863] loop1: p2 < > p4 [ 128.438895][ T380] loop0: p2 < > p4 [ 128.443174][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 128.463949][T18863] loop1: p4 size 2097152 extends beyond EOD, truncated [ 128.475058][T18876] tmpfs: Unsupported parameter 'huge' 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x6, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x4, 0x1) r5 = dup(r4) r6 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x7f, 0x0, 0x1, 0x9, 0x0, 0x4, 0x2100, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x8004, 0x6, 0x1ff, 0x3, 0xfff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8}, r5, 0x10, 0xffffffffffffffff, 0x36110cd62f66443a) fcntl$getownex(r6, 0x10, &(0x7f0000000240)) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="d5000000000000001c0200000002c85e5dd45b", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00000000f0d4f5ac539709f4fa4ca84d94"], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180), 0x0) 09:18:59 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xff0f0000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffefffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 128.482698][ T22] audit: type=1326 audit(1635499139.108:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18877 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 128.510598][ T22] audit: type=1326 audit(1635499139.138:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18877 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=128 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 128.520062][T18882] loop3: detected capacity change from 0 to 264192 [ 128.534880][ T380] loop0: p2 < > p4 [ 128.557210][T18887] loop1: detected capacity change from 0 to 264192 [ 128.562577][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:18:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x0) [ 128.575204][ T22] audit: type=1326 audit(1635499139.168:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18877 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 128.599215][ T22] audit: type=1326 audit(1635499139.168:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18877 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 128.628554][T18868] loop0: p2 < > p4 09:18:59 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x82ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:59 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) write$binfmt_elf64(r2, &(0x7f0000001700)=ANY=[], 0xfd14) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) fallocate(r2, 0x100000003, 0x80fd10, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=ANY=[@ANYBLOB="100000000000000001000000f4ff00001c000000000000000200000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 128.634973][T18868] loop0: p4 size 2097152 extends beyond EOD, truncated [ 128.642814][T18882] loop3: p2 < > p4 [ 128.646767][T18887] loop1: p2 < > p4 [ 128.648157][T18882] loop3: p4 size 2097152 extends beyond EOD, truncated [ 128.658854][T18887] loop1: p4 size 2097152 extends beyond EOD, truncated [ 128.674351][T18896] tmpfs: Unsupported parameter 'huge' 09:18:59 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x81ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="100000000000000001000000010000001c000000000000000200000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00000000435518e7c963a7d289b9652f37228f599587270fea48cf57c4ff036bca8af204bd10a1babf0d4acb3f38b3dc6ae60b188d4f7bf9c5dc28bd445df78d02492f9582c5a3471c32dd815a419fef087a42fb898a1d1fdea10745351dd030f570f25e"], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:59 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffefffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffe000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 128.699305][T18904] loop0: detected capacity change from 0 to 264192 [ 128.717874][T18906] loop4: detected capacity change from 0 to 264192 [ 128.738809][T18904] loop0: p2 < > p4 [ 128.742850][ T380] loop4: p2 < > p4 09:18:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 128.743929][T18904] loop0: p4 size 2097152 extends beyond EOD, truncated [ 128.758725][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated [ 128.768010][T18915] tmpfs: Unsupported parameter 'huge' [ 128.776710][T18906] loop4: p2 < > p4 [ 128.781063][T18906] loop4: p4 size 2097152 extends beyond EOD, truncated [ 128.784803][T18914] loop3: detected capacity change from 0 to 264192 [ 128.795810][ T380] loop4: p2 < > p4 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)="4f357fb218b0661a28fad138096dcde92a781d05af8c713c56662c1ba9c4f3a2880d795f3d3c69129101a46f62cebec9cd3a0e4e5d8d1221c757224893d61978880a536a63e59f5ef183e326f2ae822db680915e1361c6d67210895821454e213cb4d1b775a251020d88c8af035744d5856bb67bb64681128ce0ca8209fdfdf768ad98", 0x83}, {&(0x7f0000000140)="3b6ca9268094f5ea62d0e832251c14495b1c74a2d8bf89774811f1be12bc3d6a50830fb22db66e2b0388860651dca05d863cf728dab525cef10a1c0c4b96a7ff111e99f38d1e2a84a53f8713c15abd6edfb170497312a5c29a", 0x59}, {&(0x7f00000001c0)}, {&(0x7f0000000200)}, {&(0x7f0000000240)="3de2e002e88154060d55f4e01b3f1487b2638be445f8f6d878a0930f3282c736835b40ab95771784dfe84aedfed311d7ee4b30d9c9ff207f2378cd3e3e469aad62dd9cffd88e1e03b67ac5bca486e8bcc369b23784f35c3f2b94b10f8b5f10bc4c3079cd84a2e4364ccd7e14f8939b213c17bbbdeba5dd7606fc8e7b6b087ccd51f1c8431937c23063e1008569001743cc688ee85cd163a7de69561c75fbbad32e69d356f765e0c1fca757840649a71289011f66fba619b366d5dc6a610e519e52ae2f02d1b660d90eddab877454d279be71023970b7c4281e00e8752192d3f6b64eb89f9575b3bd3478400a68", 0xed}, {&(0x7f0000000340)="0a0ba37d8c76601499b4ec9b2c863593d596ac5be3cfc8529024f04808d1d4489aa98e60b4d948bf005fef20c3912e5c3bfe08d3b307de33dfa07dba05f4e159bb520c673aa9c26f5f497b53dfe80c6966b77b465bdef2edcaa2c1ada98ea445085b16fba85cf5cd1abcb746438dd337574bcacf0151931d4dcbd863a4ea36d35c0ef53ab6e125336ccb8097c45fadc31c0e50c42bb98e07ef24023d07dc44d3337e0c71070dd94b3edd403ec1d213a94470d8f0b71a9b31e1ecb8b3aa871c822b51b1672d11de69", 0xc8}], 0x6, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x60, 0x24000000}}, {{&(0x7f0000000540)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000005c0)="aaea3f5a7bc7435bf6fd5f42633575ffd7e521aab78cf283791dcae72266d3831ab5c4b3568f101c95246d1de2b0c9f3d741a9a28114171459fcfde0ca15d4c0f8f4105dc50e0c791839adbf52f60da5ca054afc6b9a250206a92b9e83a141de483ec4eb0561be731b63ed886802778750eaa7d1840cafc64bd2d402ab39bef2d9c513f72c76141ebbe5a44d532501ad7ff53816dd555ea9f2376f6353b787ace330136c8fb082f55a04f24e70ba2ac6f47b523480b4c03a3b6607ac721cec897f158a01afdc297ab5fd64afa1831f7480ef3761d9", 0xd5}, {&(0x7f00000006c0)="a20ae3129c9586ba761052fdd158ad764228b10925c9557b7159f4a588ad59028cfbcdb59f8219c6b43710c716efb6c089822b770d47823dc21a15625b2e52f4c1bdcaae1998546db06cb14922cf35beff483ddc36acafa68a236e948e327c944a0b062e35aad509d9802617514b26449245e67cb4fbadac5d", 0x79}, {&(0x7f0000000740)="35197a73d1ed24ae34197042b715b04507322e100d5e8525c36e4efb92783cbc88d5a8cae92025601e572c6cc8b41134f817c8981b995af525", 0x39}, {&(0x7f00000001c0)}, {&(0x7f00000007c0)="867e170dda8b3a534d8193d3a363553a1000a5e3c9540142e37acd3885f0be0c1420385c4a6fb1411a74b569146f7eb71510608b52a161b3381cbc25782b5a7698e2069ad8dd5772b392c0dfec1317b65220e3f8f286f6bb857e41de2a513d88cbaa03a5770a6a70b195ef241baf88ce116b577c2e171678b215317a3e7c487ffb0a30b2d3ad8a77", 0x88}, {&(0x7f0000000880)="ba67663c952c011827f111ba0bbdb4a48686ae5e5b36ad454dbc0fa9400fb1deee9bd0899d272075b1a142f0185a44ff42916c9bc841a2c2bc8274af556813b3d157979c89dd0078757070302f88e4aa184728d8bf67d2f9b6a72dd845a78c96f268b1562b934b98f13eef573e0711e84b03ae725693480f2c2195197a240afa0665a098a44d948b90261339f9a6438e399ea8ad52a5aa26a7ea7280a0c6", 0x9e}, {&(0x7f0000000940)="81c3b5aa1175deab78ad5c39aa1dec3db9fe17503b21c027d62576645e71dbaefe3d3f51a30ef72556be81a5c5d8946e5fe14c2d94a77e8dea2af5590f3c06edc25b65a9177b2df9007bfdb8e06cbfb6199701bd4ec62c92b7941ec2eacf01baf95307492fd834aa67d0123a190517133a579d9d6eee3591cafcf5cca7523b5ffd96005b2c8e5bbb90e4c1b266d8065a60f4c52e25d579773e9d0fa5b8dd5ec5f6c97c63df3159824504a0", 0xab}, {&(0x7f0000000a00)="96f19372adffe50b536d372e3bde49213918c9b4d922e13707b8b6ef6ab57b543c3d7c8c20ebb9c5c72d3c49f58673b2e6f12584d58aa8de6f54be677b952f20b8a7639402d1da670efe621338e72ebfb3d1f0b358f35ad8d837b548f8a66334d2b73df9ff7132e71ea99599d3bc58024958066e104b4853ea5843707f6b8aa4df873645c6c5d0ba1cd1b09011ce2658ac37d1b51b5c2e398b47e2ec6cd8d3dc758bde816879c950d87768b1bd182c96", 0xb0}], 0x8, 0x0, 0x0, 0x4040014}}, {{&(0x7f0000000b40)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="26520def", 0x4}], 0x1, &(0x7f00000011c0)=ANY=[], 0x70, 0x8000}}, {{&(0x7f0000000d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000dc0)="3e23b6631eb543823c26ce7a5250b4e81fe024e8ad8d25c8a9b93ae5b4e60641e1ead99e7ebc465d52666594f18d107a495b1bad57d5f986b746bf342d3d7af4c523856b678fbef1b488912e229eb21df864f453907ddb6940354811bb43a5d04527e57094140127892d3fdf9cc975fc8f31454ecea7", 0x76}, {&(0x7f0000000e40)="c0642977ac20cad4838735118e46bf994bb0c42d1520423e7a6ea99278909011ab70477bfae3c9727cf5bf9916910b9fec322f27b986790aacb21ee2053e90833519488cc5ed5cc8c44756010656dc036aa07831f329a8427dc74430954449d3a329aeb9243cdc5b72a9936e0ba5f03883d180574b495ac73507af39adcc1cb767bbfa42504f916c63ae9bd00c98c04d88c0bae356720fa98c6593d084c230334281833b6140d4a2", 0xa8}, {&(0x7f0000000f00)="e44b0406b6c724675cd889921dc0d4a1aef9d6f1222389ea8f7ed53edcd2ee9ce971d30d14e3540efcb3", 0x2a}], 0x3, &(0x7f0000003480)=[@rights={{0x44, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x108, 0x40}}, {{&(0x7f0000000c40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000022c0)=[{&(0x7f0000002080)="eec4f6de70f3662c8474efe9cfa3aabd2450bcdc3040b0db7ca54693282f009b8cfde6f4ba12a41722d685d1bfdb4e1b33394cf39bb93fd1479a92803505afdf505cffae90510d2c30c3039a655e4f6b77d3295192088754800d745d3d489f7843053a4a89798ee3d377905291dd88fbae8a53254689048eea86", 0x7a}, {&(0x7f0000002100)="4aca242623a70efb097972f7747f60100a37ff2d2f2435e49f9d6db97a5e6be28a0fed8ebabf2246b217405a9d31b12d94403045a8301558ada742dc1c1352a82ab4321c6ecb4486d9b8cfa218dbb70bb5947d285a879629898f9ca9eaa225d8a3ed2b025b744ceb2fbc1acd346fdcb5c5822b16a2c9a1cc922b9786ae0c117b3bc13b685e141d150c316c3e8f59ac3682faf102fc5d73997e989b7a8aff34689d70a4e32719619325b5e7ea9c", 0xad}, {&(0x7f00000021c0)="92ad1ce4a75c704a13eff3170316b3969d83b7b4968991dbb3d615e8cea4656f3905ad32866cdf65ac7ecbdec720965192106e5dacd8a0f366a15cc4690a08cd8c2bceb1107a341ef079a6d9c5d71a4304bc94360b6213256eee48d1d9368e71f2aae8cf20ebfa66f8d683862c153da9450ba49e26cb975f0210217f66f10479228c799649ea4d973c81a2eea49feafbc3822e5d5685c84aeb007ed67e956faf5a687dbdc56585ce1f9fb94520ce8011a30ab0cc982f83807e8237b836add9c9c0b2b2edc4b20ae0d92c066883d681108470663963df2e927b3bcb649d52815a02ddaa7face63f59c9a2c229", 0xec}], 0x3, 0x0, 0x0, 0xc080}}, {{&(0x7f0000002300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003440)=[{&(0x7f0000002380)="28cfa762a4182baf3e5f243003177dea8792881f62b15b1853b12d2db4fb6165b3f4712965ddd2cbd9033fcdb0f03afb4f34bf198908e0a3411d020bfd3238cd27b7cc98043546c2089b7c5f9696f59120f0ce82fffecd653f36e3635a6b9420d1fb45cfcf7b4c742507478ac77a9bf9b18277c7775ea0e656902ef4c32e4c199ad07ed19374c6251f551a7ef731c883be30b8b07bcb514e79ea04ac0b42ba7a7e8ea165d4608e4891962dc581de8b49a337dff1cd13221eeb3cb117a29063d8ad416cace6f9bcf81a86a39935031551b5b50f697838db3abd18e878effbac0f35f9194af16c18129845db041a05bf9154734a731669a445f92c33eff621c7132e2adb2786f926f574df51a7eedefe45ea3f72700370aa5746c50d30427e523e25eff09d3c78bd8d84914186d9eb7d5b57b6f0cf9dfe5b6a67538e3f01198daa9f335bd87a1d2e958b2cba56f3e9c5e6ea0b5f29084e4836b61f9e93132d347949d5865713dbb2a37a280487c9c9a599cd0481b2ae3428cb3f03ce6720180cac670e2f50676ac441431afa38fc91ba77e84be0f905b1643fccf91af1983a358418f43c1bc4a13940964ac43b3a7c3564624eae8c5f3b5965cc18c343022a2496ee425eab892c15333f6ba2a21b1bb2f052448a56fa7e353e9b082b438330c6987f120b9531c223dcb894967de89f56148cf2bf7ecfbf8bb7ccde66a9852ca9ca41210b79f696e8277db163e1c8bfe179c61cef8e3167d353fbdc622729ff636fac23a2519e96ece522ab6260b29c802fe9a59cd6dc9641604fadf43b91d6c2c84b423530ea545bdfb3b425d762281cb52a526d6ad0b4773fb1c33ee38fb6a8edb5916e034133fe8795da4fa2aa9017bb0bd2f4e9086ff30555a755b8832a2e588e3f2ee78f800001ce7fd17f585a145ce02628b958480e055f4525f76b345ee12fb4e3e42e4b746cdb4959b1888ecc5675e6763b1a920679767aae1ea7cf9c065fa71d7d08abaf7f6c13a28abd9e23d519650ad60929136cc46e6066d168354dc0d0151ecbc1a45593b58622744cb485c938c3876183119cc6bd40a1bfa219d4a32d5893df5e081d4efaa3e78711754d022112d98d19b5d4632ec905712c988fba32c9d687ee5feed99f75982b3f501824bb8d1b897ad0a9fd0a23515c5eacb52903ef8d43f5a9daa62ab20e405068173b95b54b998f9a540ce7a31cf8293b4be00679f464f6aaeb1e036b2dc18dfb922c27027174ec8a444ca30a9220fdcf3dabfb6f3162c6fd7797972e2fa30086850f7e0ecbe6ebeb67555dbed298e605b4903cffa3d686dd9a32199c19e1301b49ed8edeec3377822a8b7adc6cdfbc07152bfc3d8a16cc3581a17a0178e84c696a0be159ccb23076ee833b7bc3a3ca4a8be449b57140cd6b5786bfa75df78be01d98a1ca1acf2f00704eaea71f5caad1cc79065387299ac4a8e78bf87b1ef5067b2351bab7ce39c3d536113da612aba7648f60cc9b05a34cf43f06d1e421241dead44489c354bd2dfbf705e2f9c9f2d7cf2b3051bfdead56893d94880bf0b27339a8e881bf4dcfad75b80cd3383ae91aaa38470fabe282b717066fc86cdcd9a20267d095ab5c384aa6c7812a952c25fda8b6cf79a10860d2adefae03bc2fa02cb8e247d24cc7a4264c258bd2bf0566c9d1c844aef81f41ca9f1b7b3420fab59b3006fea7cf574ec68f5d71fc2bd0891ed0db5b91201f32fe1704db1c87fcf67813e820e546fa0ad18b29f73385a317a5f7a939c8e94cb232456d54bad31eb7272bb20c020eb94fd3ca9cacb61292566d0fd27c86f866449bdcb9a7602fad290046b2f0416d1a2f143a2295a99f4abafc662341cfc3637db830e8d99bfb443681c1c99936d6c5190f1062a06ca34d5671debbe9625484f812c1b07e2757457d77a108eeb8b243ef491d467e3648ae09861667007c601d55edfb705cf45a49b0361ccc4b209cc497561b46cf753a9974695d3430a61d99bc2624453c1956d47c3d226343ea021cd90acfb81300601adb5656bbd2d41542707fcc76d79a12106e7d05667d904888b995d786bf972c4a36007c3780f30bc60139e492c99ebeb8cc1c4bf8ddcd060daa764abb0f6d3c84cb34240f5851480cf78168225826d786299cb475b705aed4371988a22c2653b9236cb867b1afd99597e905e439c69843ad9f5a9db068ba70e86f275696143fecb43f2c42f07b583a4fb1b6b5240e92ecb42507487d0d82f3d96c3b6b649c3fc58fc1650a7f0b77a3307096cf09fd632f2d7409808504328385696170579d84021649f1a75b76e14d079730a83ef9543db485aa6822b84a9ae12b230dad020706f014c67d98e6263f118c962117b4975eb65f3da2bef3fadac7b71d292835e248ac4c6852b503c8af72624864401ff1128d14fe3e3d9121e4efe638d94a0fd4fc2a19b64c762973ca3fd19b464f2b7306ec38674ccc2b4f4310a70066bd5ecae3b674d21a717fd567df5766f9bfcb9cddb184166be1a418ec3244a7f4f4172c3d4ffa64f924b024f09fd63503d74c2108555372b60f8107285c264677e0649622617e7ab62fd188ec6f007303721d103665c8274c283676620bdbdbade9a9b1a991abce4110665934261fda902638baf6edba73710d8ec5c676fb0d43861c8fba9c3d4686067e6b771f612309d0874aad025cfce1e9c990116142bac652de440f391ba9eb37e51bc8521214fca9a8473d87b1de60b36eac3f4f22ef368dbb01eecf951a27051278f3ec88689c50807a60bf4d54560a6746b8f990a8c69a88cdfa99a47cffba9eaf77d1eb5694cea458853347e5016d12ee0a215a176bbc89c4e8704a6d98f2eac50c6a34ed3d8013324721d8d81504749bae72af107af91fe678340740e840f6e6896bffba7e8e07279bbb5561e28a6c39de86765df49a04975708d18af3aa1a48086140b810159f1d633eac76588336de3263babb8371afa2dc6a89d77f9d70436ee473fd33d3c02fda4646208646bf3b914eaec206b779f2de62a5222521e7245caf7cdf46091f5f3c59f7daf7efc1ee53e647b7b91d1074ffec2f9fed5d4203e0c217f7ded4e4cbf834406326f8bad9f5358e7d7899e86ed7feecbc5e6b2a12ddb0e5f1f833f1ea2f62d9159f2b3796fd5d4ef8c039d48291aab0f4b0cdecb44d502a38e7c0eec58280430c9eb7053891a2f5f80497d5ab499af9c47ee89352ff97b77c2f1f53e77b47aeec2b8cedc48cc3885e1673635bde94892a8d19cd240e11ba135099ea31748d32467d7a62dbd66fa3d9058e630352b471a2d70bfd3778af22bdac200e0b8390701e571efa5e58b062a7756ee083d3d711c6e8d8589dbd8acab37a4e0e8c536181f5b824b55c76b28b67f14b00fe7fd5ab4044376bafda6883b19a53d8814731d55c31a6280f8083f6f3c0aaa042c0bad4ad0ac978ad5e545a4a2ad72e46d9c7137bc723d4a40fbb9ec5e188858e5da30382748d52eeff140f1ea4b053df5b91725ec9ed31f089d8be287815c3ab876ca9601b1e96aeb65e8057c947848185eda692de7a5dfd168f0bf08bc605feff9d292f4483d2ce8ba3b7f2a1addf1232fb795a77ed94d3a22186ee09ea2041b71061d5f13e04e1b1152c24ae96edc31a2ce8e035f45f861e9eb981add967e5ca180932011c29d9adc1c638a7a9e7e8379a99720feafa0859d3c78d7936e4f67bcefe081041e406c98d9e9f2789a028a4abaf27cb5d73070f6c9a44ac993586c05ba16a35af0b3fc8756d0af6f9729bbad4378dcab1704a3550c6774c9eea308919bcc9064cee3170c13b06095fc803806d312d3140a7aa10180fddbcd9790ab1639e93193767428983b9d299a2b760d4a3c48ac833c8e43cadd716d61da2314201b4977fb0118ea006b804329874ff057e47a14fdc0dea94fe153974d9bb836eb48d93f0207e3ec02e87e9c47091fd3340015027fe5cc70319212f8b891cb6111fb8d8c6a2ff718387137f22fbd450a49025010129d5013eff0eec5e83197e6dcb2199ae22a9add748d7a1419c9fe9650e24a8e90654bb7ca2b9cbd07d553183305e175ba33dfa9f104ff6accd1e603d29ba2994fe0670ca51ebb4128ae47fbc2ed63c4099818118ca7febde97caa914f3a11fe4978ae2ae6b4e729859fdc54f2b760f99c8e9e8f9580d73975aa96ec1fa3714e700ab47e1d268b174e9e29bdb9233190589de6535dbcb892cca66cd6c325857b8ce94ddf514eaaa1d99a036367fe409c134e3a24cc05f716aae9eea63185de63da7c0911196f978afd2da35bada2c526ac78a6b3eef493f10a220954b823054b7c4c58df95ef369714afeeea136c275dd7aec5cdc1338c5e0df687748837d81c5f793894a42b08c94e5a75bbd4df0411f98d88c60be57d733e2059e6c145dff130b1fbf3ce2386367469b9e868f3d682bbcd5df5e33955a78af8f872dfc8ad604f076df1b25ff59e0cd0fd5709fffac6899dfb886f6769a4b004dffaba50f0c319f209f20d24b2dc4457c95c11d26a23b0e7137a375a4f61c8042345fe99e86f993d042bcc1e587a97c50253dbf024855cb0774d57f72903a151287468bb9ff777891eed2cf1f7723615027290e9c8d06c40d5c52621fe1a490355b0b6d0caebb317e19f31338ab1055df280420e163322cd830534d9d02d877d65aa2eb075d9212729b834dcc05198aadd1f8e916498c1f064e10b2308c0b29aad29266c18ba9a55e290ab42a0ee28311aa78fc1afc32d685338f0246e22408e4acda04ee401e2c826d8b76f8cbb1ef667353f9a84d1f9149dfedc4cbfdd3f844cede88e065668884d9f97f6321e49465a1a6e5d550780461fa662fa52155b51eb36696a000d53e9b1eb894e2d41d647fbbcacc3ebd2edb4cf7e8f7738dca632ee2a3e6c610a990c9eeda5d40747371b1c564be01f929368d70530cb79154c8dd8d4ff7e997475c3cd1c5c134841a1e95ceb51dc8f999f9faa9b852bafe0eee0a641bca2d812590a6bcc8a1d5b73aa1558586817ca676a41a78710086d005b9c4a0223c34c964dd74ba03bcfe12ecbb13b2edd6050ce77177a7764ed7f8cf7f571a045040ce1820fcfb63fb5d4e25ac5fe152767082bf8d48abe9692595bd816d75c2d6e258a4f36897ca887bf6b5fe3d9e8607565908a897c15cd4b6086ed185b1f6834e6012e41e433ee02d3d47d2e7e604a1fdbddf53e461ec324543004c0cad2424679a480b8dac3c17bb3906fc11db0056d7c098adcbfbdc0f6c16b62303ebd028cc52c94d9a89d9205adad46502b572e14ef1cc7f70282170b7b82403f9dfc2ef9406eaa015a9965366985f639d4e2d4ea451302714c3c73c5c7f84681e4073c429f999b9991a7c047f7e438b84cc82416d699097c849316d97f1387cd5b56e2508763a47e7d6395788304c56df015f25858a946b514939754c3928fe42593da6d57c85785f497796c6fb5920a68028a1de4792267c4e5e82dc01de5a076a4e5e252bb33da73bbf211535eb9caa7195a33914857c23bce4688b546e8c59df8a8d65e96b7a431a0f28d9cf931ca27d9b0ccdda7f18332ff66f6d3966f2a5794cc62ca6633e7cee15174027c612f785aa3f209a71ce3f1cae83fae041eba8ece0ef96f5ed1b1a5671d5db1e061d9656e57876ebe3132d884ea51d2ed31833e13d5246b57a515869a885919b4d89a49fc497400d0b4b9a7cd93b74bb4d7d1603e4cd4f7990cb45cc58aa107ae40324e80db28258d4e6b08112ef914ae2726d27b2485117fa5a85a3a672e10a62ea423a73701f31", 0x1000}, {&(0x7f0000003380)="3be3f0e9dcf82ae42ef948bccce6d13c170b6ef96758bdcdf87705a06e758022189b3194d5ea6484c14b552204d839e345f0333916a334df8eeccb059cd0cdb5193c45f11befaf3cccadc96c9ef2f9372778e37a780f813f46b58f9a4c5ae322b969e720a94fea36a7cedcdae5fa7b14962a53bd92e5c6d3f7efbc48eb34acea66583aacfea93487b95b8c98c58dda6609a52a7ab0de7f8a2ff337489e9e85dc762a28de49ef8bce8cda33d988d002566b697ce26500baff", 0xb8}], 0x2, &(0x7f0000003680)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xa0, 0x4044091}}, {{&(0x7f0000003740)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000003a40)=[{&(0x7f00000037c0)}, {&(0x7f0000003800)="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", 0xfd}, {&(0x7f0000003900)="56717d3fad91cbb02fc26def3faf532c538fc170d16d145776e86695391c28e2596da897cfd03ccc89963c93bd79d546e1b8f6e84874c8c874cf27c6abb8f3beda94123d851b706fe2950b214bbfb489d0f61edfab5b708d036d6e4aec1a1a4f3da346bbb1", 0x65}, {&(0x7f0000003980)="c1bcf68d6dbb7c71203894a548be7c14e06983e9ebf89799ea95f7916967ea759a5fe590091a40fda1d336293da13445b4fb36", 0x33}, {&(0x7f00000039c0)="f0cdf563012e3bd98ed017f68e80b2f16905dd5a2794a125204370b82dca5bd1db7b26a91c8b1caeab9c0bd8ab7b82d4dcac9694dc78e863f05a715e1939983d1c71821858a73462f1e0917e66dd2428c7bec36ca3f4bb9b579bdffe797fae22d6fdeaf20badc57eb15c48875557c8cbbef0bbe8c4be417e", 0x78}], 0x5, &(0x7f0000000f80)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c00000000000000010000100100000066a4fae31010149f191adbb3142683ff4e3e2a9ae783dbd79b7da2ac791f1430ee7235d625786874b8d73d9cf5137cd165829614d09776adcc7ca22d32a616a7df95ed48ca1bbfbc7fb98a75af0d1f1bf4a8947f2dfac1cde62263320445910b010b33dabe8fb20964e0f9c269bd", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50, 0x8000}}, {{&(0x7f0000003c80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004280)=[{&(0x7f0000003d00)="19178b2e3f460b792afa09e6b69725bef5b5be548fed6e131dd7a3e46de35606b5258d33f9f3987e22cd606d848ce17eac9af8170273dc6916b2264eefdc22dc6d25d949597599fb8f4c763cff79631bb3fc21650a5c415fef", 0x59}, {&(0x7f0000003d80)="e3bfa1a5ff8ad4d1af992fd10c0fc0421800c0448b003fb512c67f8d3c4cf0ce5658bf0a4f05a38bee9d03310b08235246615e95f390dff08d15fe5667cb66086cb05af69010bb3595b5d2402f526e623ce9ac12cadd4442940372a13c1ea57177f16bb5a43e67ecf7468394bcce854588d4def057af90f92f474fa3fbe81348f444258581bb583b3e7e278bfa95ffe22e052756d3f818d796822845914116a7ae9ee6638e007307972ae71a35ae3c1c25a6487be0164fa4f64783c3d7f6858747b73a75ce45209a202db361c62b7c77d295f4", 0xd3}, {&(0x7f0000001040)="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", 0x176}, {&(0x7f0000003f80)="d6b00515ee065dbc5ce1fd84573c0dd8f714666d3a6151cad22bd80441c08ff636cc0d03ad56bb82ff7c7978b2762f4746a758286207dc5647fdd812bd5333553455d1389336ee4704f4784850a27cf9aacbc31dc8297fca07e0b70fcca433be536e2daac8bedd9c59096e6e0841fb399a29c6adb9fdbdcd52c72cf99501d5e1d66a77c740b7d7f854765b92fea34ea916d43cd399c23c2a2ccd14b1946177e1864532ba00ffc57966350bfde49d0d2a7ad2bd5fbc40517f3ab106fe36cc69336bfa251e7e0630353510c05934a81b01676834f123c4108ac8cf5b73b30b910daf6b05cea2", 0xe5}, {&(0x7f0000004080)}, {&(0x7f00000040c0)="bfcbad714287bfd2524108caab05292092d24a9edc4101c92db0c9ee36d7fe53acf7caf70c2dcaf52a9b6fc1b5f79a60250f52d10dba26198dc40d5969a169ad0149d202a69de56af3663c572e8a97a66193e7246b646b4ea0a4431d2cfa3e445bd5944ab9dc7b0c0bad627c0fe225222baa17cdf8707d61b79e801ebec2be3f223f69f1bffff8", 0x87}, {&(0x7f0000004180)="e49495b2a4a7458f50a5caed3132b57284157a5f590b5532e14e741be940b800c9673c832eb4df375469ac89dc96b02ed69623eea41a9618f2476183509044fda441cc73f9d53647f7e9471505af4df7b048bf369a4b7987a166d431ce1f29f955f49c3487af744480ea0b7d995cf7a37a1f2f044a92b1dbd450be3fa8267994dc1626344fcbe8810559eda72871c39e1db78d15002ee0f4e262529f01eadccc060e70e133dc94fc9229f38fc5f8292b6a02fa5b990d3b63ae9e0028dcb6b4b36f9c38eeef921f54e6e849878471ce7eaa5588089ad53431eae4", 0xda}], 0x7, &(0x7f0000004680)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x88, 0x24000040}}], 0x8, 0x24004800) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)=[{&(0x7f0000001600)={0x1484, 0x3b, 0x200, 0x70bd2b, 0x25dfdbfd, "", [@nested={0xd6, 0x35, 0x0, 0x1, [@generic="7116d6b33986eecb28ef230e1e88c52734e7f0efe2b9752674cb1a0982940b94421d1f84ce2dd7e5ae7606de2a01149c142630805e14efe49a800962f1768431ba46b0455064f9e9ed814e895a53bb100797b51c0f52f7d572a1bc85d8b758ee7cc650813d2357a465c4aa2c26fa259bbd671f65259e13bf44a33d12569334558cdb620341fabc0fb587d4c0d013223ffba646377305014ea386909a4bd606f09c6fc3bd5e1d4b7242b29cc45375497587f1e1099b163c55dc136cf2c8a7cf094b1432b912f341290997", @typed={0x5, 0x49, 0x0, 0x0, @str='\x00'}]}, @generic="ecc01eb0af88de342f1e214b8f6281803bd3f80aba6e347fefff624b06cd6935c95869aa55e06ecfffaf6baf6f26b7856f18484025c8b4ed4ab4867fcb1fa99b7dcec4452da18988c61c376d844376a780c04773ad530a3404fc2d868069f6b60f03c6fe4389a413f263f1e118af87e506b3f48148559a3577a62e7b197d8ad10725af524e98f1f029cc2e0c359bfee48fc815db2d7fc6b7b597222a77ab09423d92de5098800a3faac27a7a74d13dfc446215c60f810b280298d0ede91d017fd67c3390ed3a83b41170a3811df05df50bce7488", @typed={0x8, 0x44, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x20, 0x0, 0x0, @pid=r0}, @typed={0xc, 0x24, 0x0, 0x0, @u64=0xa3}, @generic="e7184ab7abb3f8b773b7f4c16868c23f03da7c73e71235b12f097a1c8129a8d4ae6be6289a9fc6d3cda963018e8a24955cf813440fc87cf9b85fc128d6993bac67596e4977030ba4b713f099c9f67f62137d2e31c0ddb4a8c06c1eb38ab47410cb98117cd4c1bec10d54d87c0d830f1f67b078cacb3582db88009f96518a38054ff83c0ca042305167169d974815b82f0978d2e5355ffcac9e9d630d2908a2ac1dde51b90fd1f694fa24444383dc6547c12dfea8c50c60e50411ef1a1f764471bd8fde14e8ad", @nested={0xe1, 0x9, 0x0, 0x1, [@generic="94c409b03320d1c6643555a2f991c1bc6bfa1c4fa2abb3f068b9fe5447f775f8ab70ba21b7682666d89f83277ef0d70b5892b8bc3a6834eaf703acc1fccdd8b5b97b68111603e5f9a75d2dbb378979626e54f0ad4bee85e58d8874f14fa4b8b7fb5a54b1b914f7b2fb5e1256f50ef59bf1936a96361aaf77727175c4109927781ff8ffe140d3d634", @generic="78ff9de67538ec2f123398c0ce69ba571eaad92302bcd1b5308ec1bcbf88ec343b948e7ff9b8ef93e96f26", @generic="627134d3831ebd823a42cbb918834e0b1c8b8b5fafcac04592886a31b19a", @typed={0xc, 0x95, 0x0, 0x0, @u64=0x3f}]}, @nested={0x1004, 0x21, 0x0, 0x1, [@generic="6b339c011578e23f3062819eeeb646b89048fa04d9387ef964c144cf68e8b7f4f0dce05fe53723a00c037a278e4c6e2e6adc8b3c508b598bbfbaf1c549b901f753c2bd84a6556d0b9b46cd3b704cd9d86c14f409b7089c4c3d2d8b313e77a37023235d99e2368c5419985789a2f6b201d18b3c3611bb73c56edb1700c86a65c37552c8e0ed05c0411b3ac9d17d7d8b238ae8973cac28e3df23d2f1b755f7c8979da4eb6b7bda1a595d4b21e0423c13dc5093622ccd16c04b9c5b9788fd3725be4e1210c9988da2c408806c8da2cee8655eb89e1e9b2df268358545e783cc081d18029bed9fdddefc812347312a9dd04e559e03a2caf0cd9e7a11ba5a825f5fda23aa6b52cbfcc63feeb573f62e97fc4291f56ba2510db5efdf7393d3060454de00a5002a0e520a642ec3bef06e064bc41df97e8d7dc389dcafddfa0e22b291b2b24642d2fe7e8a0251cb1bd6ca5ba91b16ca062e42353381f449445ab5fad0eb3772099cc09b90301146debe510f3e08a679c6572aa3f2f84e36e7f93556e61bbbd0df842e87b41e3528fcce69efd03e62f87946d1c51119d4d3f7043ab268822636aa930a84de9d5b8ce407ba3af06ff5ca6022f4f43c88ae4ef96ccec722a165c485b2d085cdbca6f10d519cf5e9201c616806d88d2893577317a2a851455bd6d37caeb7c3a51160346785bb59004546447a9a8b865216e8b0367acaeb6b3908adbcad7cedf2896f2f41481b3f1fe7c657e5ffe14bf57f2f829ee21d6b1e1ba4022a3f266fcb3729223e4ceb8a535ffa8b315fd9d81250f7b72eefa208d13552b0f8d6499e69d9d94852059480c8b70ee5ab8d2174a10af46c72b133759b154fb3cb1ba7257464e375e73211fcb360333277e3d43e95f4f2551646a608042fe487d8ab8f4e43fefbc85d7546a48451f7460d3010881374d927ed46886ae62401207d1f9c3ed0ad5fa10f6850138ad4961b40629ca6d11bcae6bd227e5dab1493536342588149562005d79b6381c8f42ca1fb966e444b3b97bef1d6bb02b85e72e441560b98cf44ce214595203375d0446d1029d79ba2c9e351ecbc7d84f19dea31aff675a5e0b062099178b7ddc7bccd6ad98ac43c398fe507b73f8040fd6efad7207e8c830ffeff9b0f40b006d07dd34221c56d18d700bd6e0ac218f4a76b619679d13cb8d493733ee8588d725626d35652c3c7163de3eb93a3d564f35aeb6279387689e7b38fbf6763a04930b82c0bba551c295c1454d77749ee3765dbb306335c8535dfa3c4b8b046844df2cd21286214556f182bf3dcf6d67f27d75637983a190bae9a8b643ff4feb7a13286fdee074ebf55cfc0c4f6a3fcc46321ffc146a0b800fe2cd6e262a8a40f32bd66528d59aa8ee64a79978c08ff0df14a9c84c50c26291e22628164938d5ac58c411b57eb2b131b1db1a318c525804788b69b06ef011aadb538fd55c759a6f76df4e6684a54a4ebb22e8eff5b76603fda7e2c80521caa0f91f8e080f3585335696019cf63ddf90cb5176772173eb892f661a75050f1d8881229383525f4c51b193aeeafdc3105578fcebd43a9b9b343f9ac5ed49004cfb1baa0ad122ddcbe1483db2142487919c17f66e3115e49810c674b5c2f35fa7c8cf4943d7715c335788ac5d63f3893365e482f9b7be6a0e88d1e2720d121395ef4d8f2043c2ffb6b00ef8f641c43c73a7f4fa57fd0b1a6322d3d47d5b1b923f5e5ca34a43aded60dc1168133f4be848d3f9321c83778ef4b1736ec4ad9650439dd2a49755fea7d45b1769c94cad23c37b231963ca851da15c5acb1423bd40bc751ecca1145272e7694d15d4cb647519ec07fd003e413ead804a3828739cc8dad2534084f94d6f6dae108cfaace7ce98aee5bcd8f9e72c91456eec8d3fe10bae991dcf9e588b8ac5eec07c6a6146179c8742adc0d8a21e271490cb7241f5fd3a6ab384030c7d52271900bb579c9ad1bc80bea4a86b4ca6d5cff12f1d5f963c6069cd17d667e219ffa87dce41e9f50fa679463f551ac81d7dc291ff6276cb909d0ee33dba3d9643f2d5be345fb7624e4017431bcde98df055f5e5bdbf1de55ba512133df64e63452ef62e569528f07d64c52f91e0b1b83cc0d729cc988675043b96ce357da797efd3c3de55715adeebb7352091e266b3669a51d08ad34cee4deebd23d96d631a6097c484baa9f4a8a94619711b0c0b541eb91979393a4ed6f484fcb976133ab89221c956af50fe0e45a74f89ecb945793e4e8257e8c94b7f5a607ad50dc31232bcd8fa197091fbf2a23d606438011abae38f3e6a2a3cd95167b267eac2831d5e3c8dadf3ef31f6f7403be58d9c63f8c3d35614c0f3836cce5572a5a04caca790d1ea2c6602bc039d75cd3bbb338ef7ebcda32f0e984356f9029827abd9c2b77a146f3f5640da6049dbe615fbdf01f4d931783260842198c7af395bc15dfce0b759e19e33a7c1e39576e7bd18816f1c330b55e57ad4299878a836241e6379521deb84498387209c0fa87a1029b7ed2c019668a5a65052936e74cb04c440d5a5667a16a95ac6dca77961e5d3b77bc6788d7d937b98f205b596d80792bcbb5eb9f8b4eada719c6876271fc87e3ec5f99ab9bd5395381b5cf75e51e389e42142b7ed5d9965fc1125767f42c5839438c8583fe41923b52da45f4cbf275c2d154c539d925ccc544ef5a15e6b43ca64faf0d44bfbccc7d61c52decfc2128f360295a168218166a1bba06b2b57045862794693d422274908e332ad1f3c0eeafb599c1a82a1ac639b78f9996e8599dad56cb264c59139000ad882d06d7446a99a0eeb7f46f05a78fdb820bc6a742ff80069b949879d29d2cd5107681005e0a4d4eef9413622a3d3b3ccce2e982f117c63738e316f9bae2648f5fdfc2caca76d4de3f58370046c26ea0617b4d1be9c1e20823a63a5bc700c5709d4b1f32e840911bdca29bdac73b1c22e2b0622fbad27349d7d06e6b99c14971a22dd8a52b686b3ac7d917a9d7131fab9763bd31597041bc688062e87af69e0cf5e13b45e0fe95cf1abd2c8d7a89dee6f225d0892c898773920a07246bbd6058e8dcc95d3680d307825b9666dc51377371a61147711ac7bff580eefa6b3d95f6b071fc59bc1d966359b8940ad2c40c9aaef254f5c9c7322fc74570e01e0168dd8424af120fd749d687a00a1533f2cef3ccf7a209969c445fdf7af529d151b6c7124ef11ed29c044bd114a1b61b98fe5896494dded31abe853e6d51ed941a26bf723b7212046cd56262af855decb0467235637c812b2a33c5fd8cec4e846dcab0b9edf641b1a5d6c1d72f1cd875aa3a428fd7a38eaeb9c8a70c9fd251391fe95fbb693ae592fbb8aadff8af27b032f9bc7a632860472d04e90d88f27e33327824d4cd4b09e1a5b54f17bfe7035210a30bd76d7759a31b755236a29505c43318fe414b92500257553c5e319656d212d727e04a4dc5e5196c33a12ef66ca030d3ed42e68c307f0f5cdceb7456c790cafea84d176528b2f56123e8dcb6d69c0d17e7e0a2bd476b8b9887f5001f95ade44657379a0b644eb526f9e4cc60c6e2b1549420b9f4c43289fd6dbaf5fd0e403b6c71cec503616458c498b50e57c42bac273182683c0ecd83d05747e7986cb3ced2b6580924ccafb2c3a088ae0998eeec5dcfa03b3bc1ebc5ca227df2fbf1f613484cbc8095384131ab72556fa8ee76a1804ab810d70299fb08b73c1f02fd8e755cb641a5eb2cfd5833f18df6f16a0914c1599b3c2df3d61c0b434245883840a2d2d9a022e834cac3add9f6521bae0417814157f79f5f99343752f5d17d5d40e156faafa47b4c2275a12c0dcd9c2f171c847955b9f0782d5054330cb8d7ce7fbfdb6a510017e5a1c0ccc55c4d5cd1be2ed7f489895d452748c57be1156a305f7af4090cb02bead1f2ff2b91fc258a520d3d2e3301f741e422bca9557b333c181a24c53b320065defa49f3eea9ef694bd5321de2ca1ebf7efabc1d51491829893747d524d75d06d5ffb2979db7c7b76e1cab57da081b33a4f9894a4192c43c8bbde02ac64245d15d2f24a99d721ccc42adda5b9aad9e67d5457d7d87f726c48774f9169405efab1c578147258e0d9718b434cef2b4b7f099d2ba95a01354de1b5087f7bd18bd591d0ae209cf2e930ca60a528cc796649adaa1848408122a90593f5a1018fa854e1962db43f1c822b77d2a401264e98a0d48db208024bdf44d6211d8fedc7d1938a6323a62bbfe360b01f7e4b0389c09f88a560fe4844351afe1613aaf6200e200619d9afb1e771a2e64787935559e002e41262f5e5c2752f79d29351d7981c6dd5b51565ed74ce7d36deb0767acc7627f753ad63467447080334a7d803547f2d1b5df1ea4fa0720b537a01f2878e21ec9926e86a898bc4c759bb473e3f1e56d6ae8cbf36d17a159a6eedf5201e3bb06775b5b9cdf9f9b805c08af1ea8209d0e03c09ade328bdfbc5271aea67c7ed013bd2eecafc82ebdfac065ea6a8dd8168067a35c734244a9ab42cb791f2733f8d9a91ee82c5ffcca1f8a20ef570e0c5ccfa5cb8513d9f4b001a032d98a1221f0fc1f49211a1763f4c5b12cd9e081b7501687657bccae771628fe61246a733b0a71ef54b2757ca7443777add3d184d221d1d4bc382f05369ff255c762a291a602607c3498ef8fcd9bd45b0fba7228dad1eb23a4e3523d2bf9576a1321a38ad66afaf42daf856216ae1a669348565967c3ac034042ff3281c3152faf0a3e0709928d1a197a5affb964387f2f2baa2bd8a4ccefbc919917a5bd469f83d8e3a7e5e827528ca57448e84ade71c013a58d33e320e471a44e8b888e04cc323acd00733e5d8cfd7cb7307ca308458ab884ca53dcd6e9bce1844c7ff67469dc11414595f34925612ca7b4d508e63700aca3e66979c937d84391cad218976237fa4af1bcabc4a4eb49029bd11b7488152cf01e17109c1976ca693fa5708bdd6560a8d2366f41af5a1f106dc1cbf5434ee81c288bf9638ef937bb45aa3b51de81005f991a37bbab7540bd381861304c952172bb8c2c507adf10dce157f052528550ccd71264de34fec46477fb1f46b97bec207f08efa2a027671141614db91b5e77f88ef571bc375a4f268475d273f791e9b9a108ec92efb7b4767876d4939cf7a86100c9d8d20e16ebeff63ff7b5e4c8b8f65c28acc682a3e2034b94cf1e4b5dc77a51549663961e47d8b5d0f90f3716b0bb02486510136c1b21b2379c5840e6a9e0fcad72a56857438a1c09cb6b101d50f5332b035d32f0549abe552eaed41652ad87a16ff12492752231655275a01156a36a8fcaae843fc97b8e7a8d6de637bba86eef2bcdca06269297fda031f0c7d0ee80e8b6d7e50ccd6255166d0dc0bc6e0f502065a282772696b710c9c571cdd90f6bf6e9dc8731891ab1e8190262261f3393ac894b999cfa2840d51da17e2c65d1832828ec44afcb73db8e231ea7dde6605b8a79dff7529ce3b88699c467ef2ffccbb0c745796f8a555d2468283a59347b60a36869c788a64344144b2fa3566ad13bd1b5fc77f169291aef9662c9066b43cdc723a0f33129451afaaf35b194b321e2150199a3d81e7a5979e529be4255b7c494d680298ec61bdb17701b886b91d4b9a07a6261faf15a2fda506aeee801f8da1c5255ead7649c820834a06ee8bcdfe06bc25362c8e100abc0691fa8dbde5716a9ed57ab01f6f9f83183d2f89fbb86fc4ac6148aac8a73118d71090e020916847432db3811b381385dfda40e6c605479c9e99c7ac508f168d0a72bfd6b17cacb17ba"]}, @generic="cd5da2178e163e4ba448a3c2630539cdb060fa07dfd43807f369d84664c03834a683676c90fa0eeb54ee08d92e0ee18ef4d77746674fc916026b72bbb92cc26ebe55b4bd5bccf0088df3e349d764879b34669db5f32342e3a0b0e9fa3c55e0243a3550deb626eb4bbd69c3c85b436ba767b3cb93298c421753d238f3f3ffa3f02cecdcbaa8fcf6bfb127c537dd053f91afaa0c1331cd919e927388784de9e79a26903433a6df5e2086e2d4f9cddbb03151277ffd36630d3476ce5972aaa197d0a4cfa1365896e0a07cb900c3c722a931948ac3b9a17fb7336ff02e6ccd36a67cddf881275ef73c4187d264", @nested={0x10, 0x87, 0x0, 0x1, [@typed={0x8, 0x76, 0x0, 0x0, @uid=0xee01}, @typed={0x4, 0x56}]}]}, 0x1484}, {&(0x7f0000000780)={0x36c, 0x2c, 0x300, 0x70bd2c, 0x25dfdbff, "", [@typed={0x4, 0x54}, @generic="f2a345d4deab88c0b7dadd8f609c91d98c7f43ffa55db9d6e5c91bc4a66a0b8cf598c5af316f4758dd2ec4168175c49c6116643ffcf1402c1bbbc32558f2de994ba87e495cc858552736ef245d9a281bef4ddd214954dcdf4e637d020963538eeb7ae17704d630895a3a9fe9ac254427d5052213f5aae187d813b0574523361072319125fb10b6cd8ee38b105b7576fce28f8ae3fdc1a2b0132f4a753958add152295e286581cc48e76a2856d15893dcbc3c31292e7a0b077aba7740fa53b93c1dd60ff194fac0daee231caa252a47ec7140c48b44f3224b33e3955934cff3", @generic="335b082aa878f053cbee52c9539a02609795fe734c46c2b1842f191318ed723688f12d969983b6b55bea42d27a8fa6c3d76ac0ac092ad746f01cda04e4359bf0847dcd56beb3dec59e53cc99d4e4d35959fee4d7f3aec56e28d302d663cd768f2546cdf0c9b873820a8d3c5a5e505505d540b71a1d0d138203df2dea8d0b64c6b265bd7ebb7a954186bfe5a9143c8827d0c29b3f0c806710618a356a8f07ef30498eba5d5ead1b01a0f36e99f56e046531351527fd938837e082d00c9d3c33", @generic="74ad6caec344fcdc13cbcb3649a01345c28c11017b8e4a8677583a67d58a17e15a80a18a04b01d8575712112afc877a7c138c9611046b9fd4ba1e448b038636ebdd97ee505d4624d8ca3bf22f8caf6dad8e5222a9f4f4b0830d99bb8668e0d096c657f1f0123cb6c2602cd261b621fc247e8dce1c10ac4dd44d797ba5d380f990a39e74c04aa7e75495177f7de84e620b43b380f76b793f3758b6423c9e7206f4d868c38d2a00e720253cdd44c7654eb3825a912fc93f9c54d3d3950f49bdab3ec40dbd5e8f011637bbe", @typed={0x4, 0x10}, @generic="0132e298e9ae2c26e3fffa07f01e5370457ffa8a7968df27f8e54c33411782af8dfd6d7c24ca775c3d1cf8288c8a11e1de1e518dba12414605406759b6b02b17171cf3156c3c1a78f7abbb7f106df89d0d8c3c087a9eb50863a8ab81944441ed72b7780658459c571472c19dc7d73a1c612f5f8991154f4a9ca53a74124b56f25c5ba42d0a94c7a61c60c3b558f598b73b84776cf9d97863c6bfe03eebfd2b53b3bc08c3ca04ddb5e9088cc408fb22c4548d2c851b2f9a04b2443ddd74b711e0ef4a5db4296342a6e5bdc9266684617c1fe29acc4eea56", @typed={0x14, 0x1c, 0x0, 0x0, @ipv6=@empty}]}, 0x36c}], 0x2, &(0x7f00000002c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01}}}], 0x38, 0x20008040}, 0x4000) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:59 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x85ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 4: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r6 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r4, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r5, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0xc0003, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r11 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r9, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r10, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}]}, 0x20}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x4, 0x0, 0x0, 0x5, &(0x7f0000000200)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r8, r3, r9], 0x8, 0x0, 0x1}, 0x3) sendfile(r1, r2, 0x0, 0x800000080004103) [ 128.795834][T18916] loop1: detected capacity change from 0 to 264192 [ 128.800312][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated 09:18:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000080), 0x101b) [ 128.848650][T18916] loop1: p2 < > p4 [ 128.854785][T18916] loop1: p4 size 2097152 extends beyond EOD, truncated [ 128.855204][T18921] loop0: detected capacity change from 0 to 264192 [ 128.869493][T18914] loop3: p2 < > p4 [ 128.887846][T18926] tmpfs: Unsupported parameter 'huge' 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f00000002c0)=""/125, 0x7d}, {&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000000600)=""/138, 0x8a}, {&(0x7f0000000780)=""/152, 0x98}, {&(0x7f00000001c0)=""/51, 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000840)=""/202, 0xca}, {&(0x7f00000006c0)=""/7, 0x7}, {&(0x7f0000000940)=""/135, 0x87}], 0x9, &(0x7f0000000ac0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000c00)=""/110, 0x6e}, {&(0x7f0000000c80)=""/248, 0xf8}], 0x2, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0}}], 0x2, 0x0, &(0x7f0000000f40)={0x0, 0x989680}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffefff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 128.889724][T18914] loop3: p4 size 2097152 extends beyond EOD, truncated [ 128.902176][ T380] loop3: p2 < > p4 [ 128.902502][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated 09:18:59 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffe000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffe000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 128.948825][T18921] loop0: p2 < > p4 [ 128.953591][T18921] loop0: p4 size 2097152 extends beyond EOD, truncated [ 128.955507][T18933] loop1: detected capacity change from 0 to 264192 [ 128.975548][ T380] loop0: p2 < > p4 [ 128.982901][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 128.985696][T18938] loop3: detected capacity change from 0 to 264192 09:18:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:59 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x97ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x20a01, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r5 = socket$inet(0x2, 0x3, 0x1) r6 = dup(r5) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0xfffffef2}}, @rights={{0x0, 0x1, 0x1, [r4, r2, 0xffffffffffffffff]}}], 0x30, 0x80}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x10000000, 0xb7, 0x0, 0x0, 0x6, 0x7, 0x3e0000, 0x8}, 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x77, 0x2, 0x21, 0xb7, 0x0, 0xc000000000000, 0x1000000404, 0x0, 0x3e0008, 0x4}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 128.998624][T18933] loop1: p2 < > p4 [ 128.999886][T18936] loop4: detected capacity change from 0 to 264192 [ 129.009303][T18933] loop1: p4 size 2097152 extends beyond EOD, truncated [ 129.024427][T18940] tmpfs: Unsupported parameter 'huge' [ 129.038874][T18938] loop3: p2 < > p4 09:18:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffdfd, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.043189][T18938] loop3: p4 size 2097152 extends beyond EOD, truncated [ 129.046214][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 129.058459][T18945] loop0: detected capacity change from 0 to 264192 [ 129.069065][ T380] loop4: p2 < > p4 [ 129.073885][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated [ 129.093359][T18936] loop4: p2 < > p4 09:18:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x4220}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x8) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r5 = socket$inet(0x2, 0x3, 0x1) r6 = dup(r5) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000780)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x1, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ptrace$cont(0x18, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x40, 0x1f, 0x7f, 0x40, 0x0, 0x7, 0x4001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc00000, 0x1, @perf_config_ext={0x1ab8, 0x80000001}, 0x1083, 0xfffffffffffffff9, 0x1000, 0x3, 0x6, 0x5, 0x8000, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x1) 09:18:59 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffefff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.097636][T18936] loop4: p4 size 2097152 extends beyond EOD, truncated [ 129.108004][T18950] loop1: detected capacity change from 0 to 264192 [ 129.114990][ T4668] loop0: p2 < > p4 [ 129.122886][ T4668] loop0: p4 size 2097152 extends beyond EOD, truncated [ 129.132260][T18952] tmpfs: Unsupported parameter 'huge' 09:18:59 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = gettid() sched_setattr(r5, &(0x7f00000000c0)={0x38, 0x3, 0x0, 0x41, 0x80000001, 0x4, 0xfff, 0x7, 0x3, 0x4ef}, 0x0) r6 = dup(r4) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 129.150025][T18945] loop0: p2 < > p4 [ 129.151740][T18957] loop3: detected capacity change from 0 to 264192 [ 129.154285][T18945] loop0: p4 size 2097152 extends beyond EOD, truncated [ 129.170991][ T380] loop1: p2 < > p4 [ 129.176404][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 129.191416][T18950] loop1: p2 < > p4 09:18:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:18:59 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa101000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 4: unshare(0x4a060480) unshare(0x8000000) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x4b47) 09:18:59 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff7f, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.195727][T18950] loop1: p4 size 2097152 extends beyond EOD, truncated [ 129.219668][T18957] loop3: p2 < > p4 [ 129.224801][T18964] tmpfs: Unsupported parameter 'huge' [ 129.229153][T18957] loop3: p4 size 2097152 extends beyond EOD, truncated 09:18:59 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffdfd, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:18:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 129.272637][T18970] loop1: detected capacity change from 0 to 264192 [ 129.288880][T18967] loop0: detected capacity change from 0 to 264192 09:18:59 executing program 4: r0 = fork() ptrace$setregs(0xf, r0, 0x1cc, &(0x7f00000001c0)="8c7468feab088fa80cd2cb3d2a539aa46f127184ebaa69612880d8669e90e2ad858c5066594e24bfa85edb9e680df07645495bd93229d93ed540a4e0a8929a43c9f4369930390f08e29664eb6185de63d0b25241c1f0f4df3f9b150f7db38cdf9b0d264ac5ee7bcddf651aeffecc311c5cd7b035229640c2a86336518627ffff8703dc54c7a07f080035f9420f8f091aaba992d62e6ca6e6919116340bb4d5d00ce66a6f888be4dced22bda440c7534af8bc1ed01e1294c8becef6cd47948ef7a34be4e92300c997ec8eeea1b94dd3b18e4b161005cd5ecb82b23dd8b7c886f770bb5a907fe0d71a84094ababe35b539ae554542cd00") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x5) rt_sigqueueinfo(r1, 0xe, &(0x7f0000000140)={0x1b, 0x400}) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) setpgid(0x0, r2) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0x0, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') syz_open_pts(r3, 0x22000) move_pages(r0, 0x21a8, &(0x7f0000000040)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000100)=[0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0) [ 129.318115][T18975] tmpfs: Unsupported parameter 'huge' [ 129.328906][T18973] loop3: detected capacity change from 0 to 264192 09:19:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 129.364892][ T380] loop0: p2 < > p4 [ 129.368941][T18970] loop1: p2 < > p4 [ 129.373632][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 129.373649][T18973] loop3: p2 < > p4 [ 129.374168][T18973] loop3: p4 size 2097152 extends beyond EOD, [ 129.382833][T18970] loop1: p4 size 2097152 extends beyond EOD, [ 129.384376][T18973] truncated [ 129.399596][T18970] truncated [ 129.409433][T18967] loop0: p2 < > p4 09:19:00 executing program 4: prctl$PR_SET_FPEXC(0xc, 0x80000) fspick(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x55, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000380)='./bus\x00', 0x14d8c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 09:19:00 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff7f, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.414377][T18967] loop0: p4 size 2097152 extends beyond EOD, truncated [ 129.430591][T18980] tmpfs: Unsupported parameter 'huge' 09:19:00 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa5ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:19:00 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff80, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.506497][T18984] loop3: detected capacity change from 0 to 264192 [ 129.531426][T18986] loop0: detected capacity change from 0 to 264192 [ 129.552186][T18988] tmpfs: Unsupported parameter 'huge' [ 129.567030][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 129.572007][T18990] loop1: detected capacity change from 0 to 264192 [ 129.596489][T18984] loop3: p2 < > p4 [ 129.602934][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 129.612860][T18984] loop3: p4 size 2097152 extends beyond EOD, truncated [ 129.622051][T18986] loop0: p2 < > p4 [ 129.632431][T18986] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:00 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff80, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:00 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa6ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 129.666804][T18990] loop1: p2 < > p4 [ 129.685346][T18990] loop1: p4 size 2097152 extends beyond EOD, truncated [ 129.688864][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory 09:19:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000140)='./bus\x00', 0x17c) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) r2 = eventfd(0x1ff) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r2, 0x80286722, &(0x7f0000000080)={&(0x7f0000000400)=""/245, 0xf5, 0x401, 0x3}) io_setup(0x200, &(0x7f00000001c0)) creat(&(0x7f00000002c0)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x80) 09:19:00 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff81, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.732161][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 129.747802][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 129.771779][T18997] loop0: detected capacity change from 0 to 264192 [ 129.776205][T18993] loop3: detected capacity change from 0 to 264192 [ 129.785342][T18999] loop4: detected capacity change from 0 to 16 [ 129.795246][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 129.807158][ T7097] udevd[7097]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 129.811106][T19001] loop1: detected capacity change from 0 to 264192 [ 129.841402][T18999] attempt to access beyond end of device [ 129.841402][T18999] loop4: rw=2049, want=256, limit=16 [ 129.852984][ T5609] loop3: p2 < > p4 [ 129.858926][ T5609] loop3: p4 size 2097152 extends beyond EOD, truncated [ 129.859187][T18997] loop0: p2 < > p4 [ 129.871411][T18997] loop0: p4 size 2097152 extends beyond EOD, truncated [ 129.880157][T18993] loop3: p2 < > p4 [ 129.883108][T18999] attempt to access beyond end of device [ 129.883108][T18999] loop4: rw=2049, want=257, limit=16 [ 129.894835][T18999] Buffer I/O error on dev loop4, logical block 256, lost async page write [ 129.903577][T18999] attempt to access beyond end of device [ 129.903577][T18999] loop4: rw=2049, want=258, limit=16 [ 129.914375][T18999] Buffer I/O error on dev loop4, logical block 257, lost async page write [ 129.923436][T18999] attempt to access beyond end of device [ 129.923436][T18999] loop4: rw=2049, want=259, limit=16 [ 129.924107][T18993] loop3: p4 size 2097152 extends beyond EOD, [ 129.934226][T18999] Buffer I/O error on dev loop4, logical block 258, lost async page write [ 129.934576][T18999] attempt to access beyond end of device [ 129.934576][T18999] loop4: rw=2049, want=260, limit=16 [ 129.940325][T18993] truncated [ 129.941064][T19001] loop1: p2 < > p4 [ 129.948892][T18999] Buffer I/O error on dev loop4, logical block 259, lost async page write [ 129.981192][T18999] attempt to access beyond end of device [ 129.981192][T18999] loop4: rw=2049, want=261, limit=16 09:19:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:19:00 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 129.992026][T18999] Buffer I/O error on dev loop4, logical block 260, lost async page write 09:19:00 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff81, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.060072][T19001] loop1: p4 size 2097152 extends beyond EOD, truncated [ 130.064193][T19005] loop0: detected capacity change from 0 to 264192 09:19:00 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff82, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:19:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = syz_open_dev$sg(&(0x7f0000000180), 0x7, 0x10081) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000f12913ae7906379a620100000066acba95", @ANYRES32, @ANYBLOB="98b70000"]) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0x0, 0x0) fremovexattr(r5, &(0x7f0000000000)=@known='user.syz\x00') ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f00000002c0)) r6 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00'}) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES64, @ANYRESDEC=r6, @ANYBLOB="32291f00f9a2c700ebe53e352363f3f8d71ad3799472d9e89d7c6f7245d40816eb2842b95f35dfa3bf"], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r7, &(0x7f0000000200), 0x43408) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.dequeue\x00', 0x0, 0x0) [ 130.123124][T19009] loop3: detected capacity change from 0 to 264192 [ 130.138963][T19005] loop0: p2 < > p4 [ 130.143926][T19005] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:00 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xbfffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.195863][ T3246] loop3: p2 < > p4 [ 130.198381][T19013] loop1: detected capacity change from 0 to 264192 [ 130.207777][ T3246] loop3: p4 size 2097152 extends beyond EOD, truncated [ 130.227994][T19009] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 09:19:00 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff82, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), 0x0, 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 130.256923][T19019] loop0: detected capacity change from 0 to 264192 [ 130.264136][T19013] loop1: p2 < > p4 [ 130.280283][T19013] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x1f, 0x9) set_mempolicy(0x1, &(0x7f00000000c0)=0x4, 0x1) r0 = signalfd(0xffffffffffffffff, &(0x7f0000014340), 0x8) close_range(r0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000140)={r1, r2+60000000}, &(0x7f0000000100)={[0x10001]}, 0x8) unshare(0x4a060480) [ 130.323722][T19021] loop3: detected capacity change from 0 to 264192 [ 130.328718][T19019] loop0: p2 < > p4 [ 130.335990][T19019] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:01 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff85, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.373246][T19021] loop3: p2 < > p4 [ 130.385690][T19021] loop3: p4 size 2097152 extends beyond EOD, truncated [ 130.404612][ T380] loop3: p2 < > p4 [ 130.409013][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff85, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.431018][T19028] loop0: detected capacity change from 0 to 264192 [ 130.447252][T19030] loop1: detected capacity change from 0 to 264192 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), 0x0, 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 130.484804][T19028] loop0: p2 < > p4 [ 130.487361][T19032] loop3: detected capacity change from 0 to 264192 [ 130.516854][T19028] loop0: p4 size 2097152 extends beyond EOD, truncated [ 130.549395][T19030] loop1: p2 < > p4 [ 130.553843][T19032] loop3: p2 < > p4 [ 130.560157][T19032] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xeeffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), 0x0, 0x6, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 130.595080][T19030] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff8c, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.662188][T19038] loop0: detected capacity change from 0 to 264192 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) 09:19:01 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff8c, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.731138][T19040] loop1: detected capacity change from 0 to 264192 [ 130.738976][T19038] loop0: p2 < > p4 [ 130.744883][T19038] loop0: p4 size 2097152 extends beyond EOD, truncated [ 130.766857][T19044] loop3: detected capacity change from 0 to 264192 [ 130.767123][T19043] tmpfs: Unsupported parameter 'huge' 09:19:01 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.799113][T19040] loop1: p2 < > p4 [ 130.817405][T19040] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff97, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 130.858808][T19044] loop3: p2 < > p4 [ 130.868288][T19044] loop3: p4 size 2097152 extends beyond EOD, truncated [ 130.886476][T19048] loop1: detected capacity change from 0 to 264192 [ 130.902091][T19046] loop0: detected capacity change from 0 to 264192 09:19:01 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff97, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 130.962265][T19052] tmpfs: Unsupported parameter 'huge' [ 130.970759][T19050] loop3: detected capacity change from 0 to 264192 [ 130.981009][T19046] loop0: p2 < > p4 [ 130.985232][T19048] loop1: p2 < > p4 [ 130.989748][T19046] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x14800, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 131.011663][T19048] loop1: p4 size 2097152 extends beyond EOD, truncated [ 131.024153][T19050] loop3: p2 < > p4 [ 131.031305][T19050] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa1, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 131.068595][T19054] tmpfs: Unsupported parameter 'huge' 09:19:01 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa1, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:01 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xff0f000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@huge_advise}], [{@hash}]}) [ 131.107310][T19056] loop3: detected capacity change from 0 to 264192 [ 131.143253][T19058] loop1: detected capacity change from 0 to 264192 [ 131.146630][T19060] loop0: detected capacity change from 0 to 264192 [ 131.185255][T19062] tmpfs: Unsupported parameter 'huge' [ 131.191144][T19056] loop3: p2 < > p4 [ 131.195386][T19056] loop3: p4 size 2097152 extends beyond EOD, truncated [ 131.208884][T19058] loop1: p2 < > p4 [ 131.213187][T19058] loop1: p4 size 2097152 extends beyond EOD, truncated [ 131.228721][T19060] loop0: p2 < > p4 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:19:01 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa5, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 131.233326][T19060] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:01 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa5, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:19:01 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffefffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 131.306396][T19066] loop1: detected capacity change from 0 to 264192 [ 131.328452][T19068] loop3: detected capacity change from 0 to 264192 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 131.358944][T19070] loop0: detected capacity change from 0 to 264192 [ 131.404783][ T4668] loop3: p2 < > p4 [ 131.410713][T19066] loop1: p2 < > p4 [ 131.415488][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 131.423508][T19070] loop0: p2 < > p4 [ 131.426744][T19066] loop1: p4 size 2097152 extends beyond EOD, truncated [ 131.435573][T19070] loop0: p4 size 2097152 extends beyond EOD, truncated [ 131.444337][T19068] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:02 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa6, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa6, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 131.536520][T19076] loop0: detected capacity change from 0 to 264192 [ 131.550254][T19080] tmpfs: Unknown parameter 'hash' [ 131.557462][T19078] loop1: detected capacity change from 0 to 264192 [ 131.575749][T19082] loop3: detected capacity change from 0 to 264192 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 131.590939][T19076] loop0: p2 < > p4 [ 131.596231][T19076] loop0: p4 size 2097152 extends beyond EOD, truncated [ 131.607833][T19078] loop1: p2 < > p4 [ 131.625934][T19084] tmpfs: Unknown parameter 'hash' [ 131.627049][T19078] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffff0700, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa9, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 131.652700][ T4668] loop3: p2 < > p4 [ 131.657286][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 131.679115][T19082] loop3: p2 < > p4 [ 131.682521][T19086] loop0: detected capacity change from 0 to 264192 [ 131.694439][T19082] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 131.717715][T19088] tmpfs: Unknown parameter 'hash' [ 131.717786][T19090] loop1: detected capacity change from 0 to 264192 [ 131.752572][T19086] loop0: p2 < > p4 [ 131.757057][T19086] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffa9, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffff7f, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 131.846576][T19094] loop3: detected capacity change from 0 to 264192 [ 131.861285][T19090] loop1: p2 < > p4 [ 131.876016][T19096] loop0: detected capacity change from 0 to 264192 [ 131.887479][T19090] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffbf, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 131.938701][T19094] loop3: p2 < > p4 [ 131.943840][T19094] loop3: p4 size 2097152 extends beyond EOD, truncated [ 131.951333][T19096] loop0: p2 < > p4 [ 131.956833][T19096] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffbf, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 131.988351][T19100] loop1: detected capacity change from 0 to 264192 [ 132.047315][T19104] loop3: detected capacity change from 0 to 264192 [ 132.058455][ T4660] loop1: p2 < > p4 [ 132.062951][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 132.092422][T19100] loop1: p2 < > p4 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:02 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffc9, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 132.112668][T19100] loop1: p4 size 2097152 extends beyond EOD, truncated [ 132.151156][T19108] loop0: detected capacity change from 0 to 264192 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.179590][T19104] loop3: p2 < > p4 [ 132.193601][T19110] loop1: detected capacity change from 0 to 264192 [ 132.202565][T19104] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffc9, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.238683][T19108] loop0: p2 < > p4 [ 132.243291][T19108] loop0: p4 size 2097152 extends beyond EOD, truncated [ 132.263282][T19110] loop1: p2 < > p4 [ 132.278425][T19110] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:02 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="02f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 132.292326][T19114] loop3: detected capacity change from 0 to 264192 [ 132.304586][ T380] loop1: p2 < > p4 [ 132.319010][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:03 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffe4, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 132.345738][T19118] loop0: detected capacity change from 0 to 1 [ 132.359228][T19114] loop3: p2 < > p4 [ 132.377552][T19114] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.408086][T19122] loop1: detected capacity change from 0 to 264192 09:19:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.449573][T19118] loop0: p2 < > p4 [ 132.453468][T19118] loop0: p2 size 2 extends beyond EOD, truncated [ 132.460415][T19122] loop1: p2 < > p4 [ 132.477770][T19118] loop0: p4 size 2097152 extends beyond EOD, truncated [ 132.477971][T19122] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffe4, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffee, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:03 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="04f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 132.580152][T19130] loop1: detected capacity change from 0 to 264192 [ 132.583044][T19128] loop3: detected capacity change from 0 to 264192 09:19:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.623444][ T4660] loop1: p2 < > p4 [ 132.623598][T19134] loop0: detected capacity change from 0 to 1 [ 132.633637][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 132.641392][T19128] loop3: p2 < > p4 [ 132.652416][T19130] loop1: p2 < > p4 [ 132.658740][T19134] loop0: p2 < > p4 [ 132.662656][T19134] loop0: p2 size 2 extends beyond EOD, truncated 09:19:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:03 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffff6, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 132.669873][T19128] loop3: p4 size 2097152 extends beyond EOD, truncated [ 132.676909][T19130] loop1: p4 size 2097152 extends beyond EOD, truncated [ 132.678772][T19134] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:03 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="05f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffee, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 132.752220][T19140] loop1: detected capacity change from 0 to 264192 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.802750][T19146] loop3: detected capacity change from 0 to 264192 [ 132.806054][T19144] loop0: detected capacity change from 0 to 1 [ 132.815888][ T4660] loop1: p2 < > p4 [ 132.827452][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 132.846753][T19140] loop1: p2 < > p4 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.854241][T19140] loop1: p4 size 2097152 extends beyond EOD, truncated [ 132.878694][T19144] loop0: p2 < > p4 [ 132.878752][T19146] loop3: p2 < > p4 [ 132.882660][T19144] loop0: p2 size 2 extends beyond EOD, truncated [ 132.897914][T19146] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 132.917365][T19144] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffb, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:03 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffff6, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="06f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 133.052079][T19155] loop3: detected capacity change from 0 to 264192 [ 133.067322][T19157] loop1: detected capacity change from 0 to 264192 [ 133.072301][T19160] loop0: detected capacity change from 0 to 1 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.118615][ T4668] loop3: p2 < > p4 [ 133.123633][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 133.143387][ T5609] loop0: p2 < > p4 [ 133.145686][T19157] loop1: p2 < > p4 [ 133.147315][ T5609] loop0: p2 size 2 extends beyond EOD, truncated [ 133.157579][T19157] loop1: p4 size 2097152 extends beyond EOD, truncated [ 133.165393][ T5609] loop0: p4 size 2097152 extends beyond EOD, truncated [ 133.169900][T19155] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 133.195991][T19160] loop0: p2 < > p4 [ 133.212597][T19160] loop0: p2 size 2 extends beyond EOD, truncated 09:19:03 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffb, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 133.248795][T19160] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:03 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffd, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="07f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.298290][T19164] loop3: detected capacity change from 0 to 264192 [ 133.315152][T19166] loop1: detected capacity change from 0 to 264192 [ 133.331837][T19164] loop3: p2 < > p4 [ 133.338530][T19164] loop3: p4 size 2097152 extends beyond EOD, truncated [ 133.358372][T19170] loop0: detected capacity change from 0 to 1 [ 133.383024][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 133.398363][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory 09:19:04 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffd, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 133.405420][T19166] loop1: p2 < > p4 [ 133.412573][ T4660] loop0: p2 < > p4 [ 133.414514][T19166] loop1: p4 size 2097152 extends beyond EOD, truncated [ 133.416821][ T4660] loop0: p2 size 2 extends beyond EOD, truncated [ 133.438850][T19172] loop3: detected capacity change from 0 to 264192 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.453713][ T4660] loop0: p4 size 2097152 extends beyond EOD, truncated [ 133.471185][T19170] loop0: p2 < > p4 [ 133.481482][T19170] loop0: p2 size 2 extends beyond EOD, truncated [ 133.498758][T19172] loop3: p2 < > p4 09:19:04 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffe, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.500085][T19170] loop0: p4 size 2097152 extends beyond EOD, truncated [ 133.503858][T19172] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:04 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="08f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 133.570185][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 133.581045][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 133.590566][T19178] loop1: detected capacity change from 0 to 264192 09:19:04 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffe, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 133.621826][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 133.622675][T19180] loop0: detected capacity change from 0 to 1 [ 133.656756][ T3246] loop1: p2 < > p4 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.666458][ T3246] loop1: p4 size 2097152 extends beyond EOD, truncated [ 133.678466][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 133.697468][T19182] loop3: detected capacity change from 0 to 264192 [ 133.697661][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 133.721059][T19178] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 133.730228][ T7097] loop3: p2 < > p4 [ 133.734383][T19180] loop0: p2 < > p4 [ 133.746268][ T7097] loop3: p4 size 2097152 extends beyond EOD, truncated [ 133.748934][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 133.753451][T19180] loop0: p2 size 2 extends beyond EOD, truncated 09:19:04 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x80000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 133.764863][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 133.786679][T19182] loop3: p2 < > p4 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.813286][T19182] loop3: p4 size 2097152 extends beyond EOD, truncated [ 133.835468][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 133.847333][T19180] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:04 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 133.859000][T19186] loop1: detected capacity change from 0 to 264192 [ 133.898778][T19186] loop1: p2 < > p4 [ 133.909590][T19186] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:04 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="09f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:04 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x100000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 133.960204][T19190] loop3: detected capacity change from 0 to 264192 [ 133.997216][T19194] loop0: detected capacity change from 0 to 1 [ 134.008821][ T4660] loop3: p2 < > p4 [ 134.011011][T19196] loop1: detected capacity change from 0 to 264192 [ 134.013543][ T4660] loop3: p4 size 2097152 extends beyond EOD, truncated [ 134.032867][T19190] loop3: p2 < > p4 [ 134.037913][T19190] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 134.070396][ T5609] loop0: p2 < > p4 [ 134.074330][ T5609] loop0: p2 size 2 extends beyond EOD, truncated [ 134.089130][T19196] loop1: p2 < > p4 [ 134.096024][T19196] loop1: p4 size 2097152 extends beyond EOD, truncated [ 134.105570][ T5609] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:04 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x80000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 134.133858][T19194] loop0: p2 < > p4 [ 134.137808][T19194] loop0: p2 size 2 extends beyond EOD, truncated [ 134.156302][T19202] loop3: detected capacity change from 0 to 264192 [ 134.172019][T19194] loop0: p4 size 2097152 extends beyond EOD, truncated [ 134.249338][T19202] loop3: p2 < > p4 09:19:04 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:04 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.282714][T19202] loop3: p4 size 2097152 extends beyond EOD, truncated [ 134.316698][T19206] loop1: detected capacity change from 0 to 264192 09:19:04 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffe4, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:05 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x100000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.346980][T19208] loop0: detected capacity change from 0 to 1 [ 134.360453][T19210] loop2: detected capacity change from 0 to 264192 [ 134.367805][T19206] loop1: p2 < > p4 [ 134.372174][T19206] loop1: p4 size 2097152 extends beyond EOD, truncated [ 134.429048][T19210] loop2: p2 < > p4 [ 134.429060][ T4668] loop0: p2 < > p4 [ 134.438283][ T4668] loop0: p2 size 2 extends beyond EOD, truncated [ 134.441464][T19210] loop2: p4 size 2097152 extends beyond EOD, truncated [ 134.451772][ T4668] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:05 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.476275][T19212] loop3: detected capacity change from 0 to 264192 [ 134.485741][T19208] loop0: p2 < > p4 [ 134.492374][T19208] loop0: p2 size 2 extends beyond EOD, truncated [ 134.519060][T19212] loop3: p2 < > p4 09:19:05 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="04f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.528016][T19212] loop3: p4 size 2097152 extends beyond EOD, truncated [ 134.530118][T19208] loop0: p4 size 2097152 extends beyond EOD, truncated [ 134.549269][T19214] loop1: detected capacity change from 0 to 264192 09:19:05 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.584737][T19216] loop2: detected capacity change from 0 to 1 09:19:05 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0bf605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.628877][T19214] loop1: p2 < > p4 [ 134.639287][T19216] loop2: p2 < > p4 [ 134.643165][T19216] loop2: p2 size 2 extends beyond EOD, truncated [ 134.655922][T19214] loop1: p4 size 2097152 extends beyond EOD, truncated [ 134.663613][T19216] loop2: p4 size 2097152 extends beyond EOD, truncated [ 134.666128][T19218] loop3: detected capacity change from 0 to 264192 09:19:05 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.691767][T19220] loop0: detected capacity change from 0 to 1 [ 134.708694][ T4668] loop3: p2 < > p4 [ 134.713587][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 134.723935][T19218] loop3: p2 < > p4 [ 134.728222][T19218] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:05 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.770312][T19220] loop0: p2 < > p4 [ 134.774848][T19220] loop0: p2 size 2 extends beyond EOD, truncated 09:19:05 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.819713][T19220] loop0: p4 size 2097152 extends beyond EOD, truncated [ 134.820548][T19222] loop1: detected capacity change from 0 to 264192 [ 134.851561][T19224] loop3: detected capacity change from 0 to 264192 09:19:05 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0cf605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.867575][T19226] loop2: detected capacity change from 0 to 264192 [ 134.878788][T19222] loop1: p2 < > p4 [ 134.883012][T19222] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:05 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x20000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.920392][T19228] loop0: detected capacity change from 0 to 1 [ 134.926781][T19224] loop3: p2 < > p4 [ 134.931447][T19224] loop3: p4 size 2097152 extends beyond EOD, truncated [ 134.938839][T19226] loop2: p2 < > p4 [ 134.948677][T19226] loop2: p4 size 2097152 extends beyond EOD, truncated [ 134.958716][T19228] loop0: p2 < > p4 [ 134.962661][T19228] loop0: p2 size 2 extends beyond EOD, truncated 09:19:05 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7ffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 134.978969][T19228] loop0: p4 size 2097152 extends beyond EOD, truncated [ 134.993166][T19230] loop1: detected capacity change from 0 to 264192 09:19:05 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:05 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0df605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.059563][T19232] loop3: detected capacity change from 0 to 264192 [ 135.069142][T19234] loop2: detected capacity change from 0 to 264192 09:19:05 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x90000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.114345][T19236] loop0: detected capacity change from 0 to 1 [ 135.120764][T19234] loop2: p2 < > p4 [ 135.121985][T19232] loop3: p2 < > p4 [ 135.125906][T19230] loop1: p2 < > p4 [ 135.134064][T19234] loop2: p4 size 2097152 extends beyond EOD, truncated [ 135.136233][T19232] loop3: p4 size 2097152 extends beyond EOD, truncated [ 135.148812][T19230] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:05 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x20000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:05 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffc9, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.202838][T19236] loop0: p2 < > p4 [ 135.218108][T19236] loop0: p2 size 2 extends beyond EOD, truncated [ 135.227186][T19238] loop1: detected capacity change from 0 to 264192 [ 135.254348][T19240] loop3: detected capacity change from 0 to 264192 [ 135.261106][T19236] loop0: p4 size 2097152 extends beyond EOD, truncated [ 135.267661][T19242] loop2: detected capacity change from 0 to 264192 09:19:05 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0ef605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.318676][ T5609] loop3: p2 < > p4 [ 135.323289][T19242] loop2: p2 < > p4 [ 135.327276][ T5609] loop3: p4 size 2097152 extends beyond EOD, truncated [ 135.327576][T19242] loop2: p4 size 2097152 extends beyond EOD, truncated [ 135.351968][T19244] loop0: detected capacity change from 0 to 1 [ 135.352755][T19238] loop1: p2 < > p4 [ 135.364156][T19240] loop3: p2 < > p4 09:19:06 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x90000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.368512][T19240] loop3: p4 size 2097152 extends beyond EOD, truncated [ 135.376745][T19238] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:06 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc0000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.418830][T19244] loop0: p2 < > p4 [ 135.423175][T19244] loop0: p2 size 2 extends beyond EOD, truncated [ 135.444249][T19246] loop3: detected capacity change from 0 to 264192 09:19:06 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x21, 0x40, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0xffff0000, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)={0x0, ""/256, 0x0, 0x0}) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000052400)={0x3, [{}, {0x0, r8}, {r7}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6}, {r6, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7}, {r6, r8}, {r6, r8}, {r7}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6}, {r7, r8}, {r7, r8}, {r6, r8}, {r6}, {r6, r8}, {r6}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7}, {r7, r8}, {r6}, {r6, r8}, {r7}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6}, {r7}, {r7, r8}, {r6, r8}, {r7, r8}, {r7}, {r7}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6}, {0x0, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6}, {r6, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6}, {r6, r8}, {r7}, {r6}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}], 0x5, "810086ff97d95d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053400)={0x2, [{r6}, {}, {r7}, {r7}, {}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {r7}, {}, {}, {r6}, {}, {r6}, {}, {r6}, {r6}, {}, {0x0, r8}, {r6}, {}, {r7, r8}, {r6}, {r6}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {}, {r6}, {r7, r8}, {r7}, {r7}, {}, {r6}, {r6, r8}, {r6}, {r6}, {}, {r7}, {r7}, {r6, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r6}, {r7}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {}, {0x0, r8}, {r6, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {0x0, r8}, {r6, r8}, {}, {r7, r8}, {}, {0x0, r8}, {r7}, {}, {0x0, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {r6, r8}, {}, {}, {r7, r8}, {r6, r8}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r7}, {r7, r8}, {r7, r8}, {r7}, {r6, r8}, {r7, r8}, {r6, r8}, {}, {r6}, {r6, r8}, {0x0, r8}, {}, {}, {r7, r8}, {r7}, {r6, r8}, {}, {r7, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {}, {r6, r8}, {r7, r8}, {}, {r7}, {r7, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {0x0, r8}, {}, {r7}, {r7}, {r7}, {r6}, {0x0, r8}, {}, {r7, r8}, {}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6, r8}, {r6}, {}, {}, {r7}, {0x0, r8}, {}, {r7, r8}, {}, {r7}, {}, {r6, r8}, {}, {r7, r8}, {}, {}, {r7}, {r7}, {0x0, r8}, {r7}, {}, {}, {r7}, {}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {r6}, {0x0, r8}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {r6, r8}, {r6}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {r7}, {}, {r6}, {r7, r8}, {r7, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {r6}, {}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {r7}, {r6, r8}, {}, {r7}, {}, {r6}, {}, {0x0, r8}, {r6}, {r6}, {}, {}, {}, {r6, r8}, {}, {}, {}, {}, {r7, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {0x0, r9}, {0x0, r8}], 0x5, "7afd49454d79ef"}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 135.465535][T19244] loop0: p4 size 2097152 extends beyond EOD, truncated [ 135.473389][T19248] loop1: detected capacity change from 0 to 264192 [ 135.496629][ C0] scsi_io_completion_action: 42 callbacks suppressed [ 135.496673][ C0] sd 0:0:1:0: tag#6400 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.513208][ C0] sd 0:0:1:0: tag#6400 CDB: opcode=0xe5 (vendor) 09:19:06 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.519559][ C0] sd 0:0:1:0: tag#6400 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.528589][ C0] sd 0:0:1:0: tag#6400 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.537603][ C0] sd 0:0:1:0: tag#6400 CDB[20]: ba [ 135.540179][T19252] loop2: detected capacity change from 0 to 264192 [ 135.544593][T19250] validate_nla: 19 callbacks suppressed [ 135.544689][T19250] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 135.608403][ C0] sd 0:0:1:0: tag#6401 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.618230][ C0] sd 0:0:1:0: tag#6401 CDB: opcode=0xe5 (vendor) [ 135.624589][ C0] sd 0:0:1:0: tag#6401 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.633631][ C0] sd 0:0:1:0: tag#6401 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.642695][ C0] sd 0:0:1:0: tag#6401 CDB[20]: ba 09:19:06 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(r1, 0x407, 0x1ff) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@loopback, 0x4e20, 0x3ff, 0x4e22, 0x8, 0xa, 0x0, 0xc0, 0x84, 0x0, 0xee00}, {0x4, 0x3f, 0x7f, 0x8, 0x4, 0x4, 0x4, 0x3f}, {0x48490, 0x4, 0x3, 0x7}, 0x7, 0x6e6bb1, 0x0, 0x0, 0x1, 0x1}, {{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3503, 0x4, 0x0, 0x0, 0x7, 0x9, 0x9}}, 0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 135.703900][ C0] sd 0:0:1:0: tag#6402 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.713847][ C0] sd 0:0:1:0: tag#6402 CDB: opcode=0xe5 (vendor) [ 135.720278][ C0] sd 0:0:1:0: tag#6402 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.729579][ C0] sd 0:0:1:0: tag#6402 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.738619][ C0] sd 0:0:1:0: tag#6402 CDB[20]: ba [ 135.745338][T19257] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 09:19:06 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) getpeername(r4, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000001c0)=0x80) r6 = dup(r5) sendmmsg$unix(r6, &(0x7f0000000040)=[{{&(0x7f0000001280)=@abs={0x0, 0x0, 0x10000}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="100000000000000001000000010000001c936c238db2dfaa0000000000000002000000020000ca80e18fb6c023031eda8177c5e947b7618fe15ac7349b15ea777a149fe2b1b085a7da45a50e", @ANYRES64, @ANYRES32=0xee01, @ANYBLOB="00078000ed0dd6000000000000", @ANYBLOB='\x00\x00\x00\x00'], 0x30}}], 0x1, 0x0) getsockopt$sock_buf(r6, 0x1, 0x3b, &(0x7f0000001600)=""/4096, &(0x7f00000000c0)=0x1000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 135.798376][ C0] sd 0:0:1:0: tag#6403 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.808203][ C0] sd 0:0:1:0: tag#6403 CDB: opcode=0xe5 (vendor) [ 135.814561][ C0] sd 0:0:1:0: tag#6403 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.823741][ C0] sd 0:0:1:0: tag#6403 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.832788][ C0] sd 0:0:1:0: tag#6403 CDB[20]: ba [ 135.855977][ C1] sd 0:0:1:0: tag#6404 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.865852][ C1] sd 0:0:1:0: tag#6404 CDB: opcode=0xe5 (vendor) [ 135.872209][ C1] sd 0:0:1:0: tag#6404 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.881247][ C1] sd 0:0:1:0: tag#6404 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.890286][ C1] sd 0:0:1:0: tag#6404 CDB[20]: ba [ 135.895990][ T5609] loop3: p2 < > p4 [ 135.901138][ T5609] loop3: p4 size 2097152 extends beyond EOD, truncated [ 135.925857][T19262] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 135.935644][ T4660] loop1: p2 < > p4 [ 135.941196][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:06 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="10f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 135.948643][ C1] sd 0:0:1:0: tag#6405 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.958492][ C1] sd 0:0:1:0: tag#6405 CDB: opcode=0xe5 (vendor) [ 135.964864][ C1] sd 0:0:1:0: tag#6405 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.973909][ C1] sd 0:0:1:0: tag#6405 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.982963][ C1] sd 0:0:1:0: tag#6405 CDB[20]: ba [ 135.991299][T19246] loop3: p2 < > p4 09:19:06 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="100000000000000001000000010000001c000000000000000200000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00000000f73112e0c7351c8415b352ebc2ea058c81f4cd00413b1628ce47de63f2b10a2f95c959153808e786b049704dec34e61b7d474f97a7"], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:19:06 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc0000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 136.002121][T19266] loop0: detected capacity change from 0 to 1 [ 136.014697][T19246] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.028777][T19248] loop1: p2 < > p4 [ 136.033426][T19252] loop2: p2 < > p4 [ 136.037996][T19252] loop2: p4 size 2097152 extends beyond EOD, truncated [ 136.048269][ C1] sd 0:0:1:0: tag#6406 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 136.048692][T19266] loop0: p2 < > p4 [ 136.058124][ C1] sd 0:0:1:0: tag#6406 CDB: opcode=0xe5 (vendor) [ 136.068232][ C1] sd 0:0:1:0: tag#6406 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 136.077272][ C1] sd 0:0:1:0: tag#6406 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 136.086303][ C1] sd 0:0:1:0: tag#6406 CDB[20]: ba [ 136.090361][T19266] loop0: p2 size 2 extends beyond EOD, truncated [ 136.093521][T19268] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 09:19:06 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) 09:19:06 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe0ffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:06 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe0ffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:06 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x100000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:06 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x100000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 136.103101][T19266] loop0: p4 size 2097152 extends beyond EOD, truncated [ 136.110330][T19248] loop1: p4 size 2097152 extends beyond EOD, truncated [ 136.139164][T19274] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 09:19:06 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="11f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:06 executing program 2: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="100000000000000001000000010000001c000000000000000200000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00000000f73112e0c7351c8415b352ebc2ea058c81f4cd00413b1628ce47de63f2b10a2f95c959153808e786b049704dec34e61b7d474f97a7"], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:19:06 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x3, 0xfffffffffffffe52, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x40004, 0x100000, 0x0, 0x0, 0x1, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f00000000c0)={0x3, 'bridge_slave_1\x00', {0x20000000}, 0x81}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r5 = socket$inet(0x2, 0x3, 0x1) r6 = dup(r5) sendmmsg$unix(r6, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="100000000000000001000080010000001c0000000000000002000000090000001750d1fc0be46a883c6d73edbf5db2df5c192666386911cbf9094146fa8caaf5b3ae5b832d21286a848a46106bed2b7a571d9be96b859c261e93bf357f35ba9642c67c183750ddb9a6cca0a6", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 136.205493][T19281] loop1: detected capacity change from 0 to 264192 [ 136.235382][ C0] sd 0:0:1:0: tag#6407 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 136.238117][ C1] sd 0:0:1:0: tag#6408 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 136.245342][ C0] sd 0:0:1:0: tag#6407 CDB: opcode=0xe5 (vendor) [ 136.254999][ C1] sd 0:0:1:0: tag#6408 CDB: opcode=0xe5 (vendor) [ 136.255020][ C1] sd 0:0:1:0: tag#6408 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 136.255038][ C1] sd 0:0:1:0: tag#6408 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 136.255057][ C1] sd 0:0:1:0: tag#6408 CDB[20]: ba [ 136.257024][T19288] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 09:19:06 executing program 2: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(r1, 0x407, 0x1ff) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@loopback, 0x4e20, 0x3ff, 0x4e22, 0x8, 0xa, 0x0, 0xc0, 0x84, 0x0, 0xee00}, {0x4, 0x3f, 0x7f, 0x8, 0x4, 0x4, 0x4, 0x3f}, {0x48490, 0x4, 0x3, 0x7}, 0x7, 0x6e6bb1, 0x0, 0x0, 0x1, 0x1}, {{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3503, 0x4, 0x0, 0x0, 0x7, 0x9, 0x9}}, 0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 136.261590][ C0] sd 0:0:1:0: tag#6407 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 136.308563][ C0] sd 0:0:1:0: tag#6407 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 136.317660][ C0] sd 0:0:1:0: tag#6407 CDB[20]: ba [ 136.325823][T19289] loop0: detected capacity change from 0 to 1 [ 136.331435][ C0] sd 0:0:1:0: tag#6409 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 136.341750][ C0] sd 0:0:1:0: tag#6409 CDB: opcode=0xe5 (vendor) [ 136.348081][ C0] sd 0:0:1:0: tag#6409 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 136.350135][T19287] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 136.357149][ C0] sd 0:0:1:0: tag#6409 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 136.374259][ C0] sd 0:0:1:0: tag#6409 CDB[20]: ba [ 136.381261][T19291] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 136.384870][T19281] loop1: p2 < > p4 09:19:07 executing program 2: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(r1, 0x407, 0x1ff) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@loopback, 0x4e20, 0x3ff, 0x4e22, 0x8, 0xa, 0x0, 0xc0, 0x84, 0x0, 0xee00}, {0x4, 0x3f, 0x7f, 0x8, 0x4, 0x4, 0x4, 0x3f}, {0x48490, 0x4, 0x3, 0x7}, 0x7, 0x6e6bb1, 0x0, 0x0, 0x1, 0x1}, {{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3503, 0x4, 0x0, 0x0, 0x7, 0x9, 0x9}}, 0xe8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:19:07 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x0, 0x0, 0x4, 0x7fffffff, 0x9, 0xa1, 0xe810, 0x6, 0x2}, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) [ 136.401302][T19281] loop1: p4 size 2097152 extends beyond EOD, truncated [ 136.411368][T19283] loop3: detected capacity change from 0 to 264192 [ 136.418919][T19289] loop0: p2 < > p4 [ 136.422920][T19296] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 136.423927][T19289] loop0: p2 size 2 extends beyond EOD, truncated [ 136.437796][ T4660] loop3: p2 < > p4 [ 136.442196][ T4660] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.452783][T19283] loop3: p2 < > p4 09:19:07 executing program 2: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x21, 0x40, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0xffff0000, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)={0x0, ""/256, 0x0, 0x0}) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000052400)={0x3, [{}, {0x0, r8}, {r7}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6}, {0x0, r8}, {r7, r8}, {r6, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6}, {r6, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7}, {r6, r8}, {r6, r8}, {r7}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6}, {r7, r8}, {r7, r8}, {r6, r8}, {r6}, {r6, r8}, {r6}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6}, {r7, r8}, {r6, r8}, {r7}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7}, {r7, r8}, {r6}, {r6, r8}, {r7}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6}, {r7}, {r7, r8}, {r6, r8}, {r7, r8}, {r7}, {r7}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {0x0, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r6}, {0x0, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6}, {r6, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {0x0, r8}, {r7, r8}, {r7, r8}, {r6}, {r6, r8}, {r7}, {r6}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r6, r8}, {r7, r8}, {r7, r8}, {r7, r8}, {r6, r8}], 0x5, "810086ff97d95d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053400)={0x2, [{r6}, {}, {r7}, {r7}, {}, {r7, r8}, {0x0, r8}, {r6}, {}, {r6}, {r7}, {}, {}, {r6}, {}, {r6}, {}, {r6}, {r6}, {}, {0x0, r8}, {r6}, {}, {r7, r8}, {r6}, {r6}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {}, {r6}, {r7, r8}, {r7}, {r7}, {}, {r6}, {r6, r8}, {r6}, {r6}, {}, {r7}, {r7}, {r6, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r6}, {r7}, {r7}, {r6, r8}, {0x0, r8}, {r6}, {}, {0x0, r8}, {r6, r8}, {}, {r6, r8}, {r6}, {}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {r7, r8}, {}, {0x0, r8}, {r6, r8}, {}, {r7, r8}, {}, {0x0, r8}, {r7}, {}, {0x0, r8}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {r6, r8}, {}, {}, {r7, r8}, {r6, r8}, {}, {r7}, {0x0, r8}, {}, {r6, r8}, {r7}, {r7, r8}, {r7, r8}, {r7}, {r6, r8}, {r7, r8}, {r6, r8}, {}, {r6}, {r6, r8}, {0x0, r8}, {}, {}, {r7, r8}, {r7}, {r6, r8}, {}, {r7, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {r6}, {0x0, r8}, {}, {r7}, {r6, r8}, {}, {r6, r8}, {r7, r8}, {}, {r7}, {r7, r8}, {r7}, {0x0, r8}, {r7}, {0x0, r8}, {0x0, r8}, {}, {r7}, {r7}, {r7}, {r6}, {0x0, r8}, {}, {r7, r8}, {}, {r6, r8}, {}, {}, {0x0, r8}, {0x0, r8}, {r6}, {}, {}, {}, {r7, r8}, {r6}, {0x0, r8}, {r6, r8}, {r6}, {}, {}, {r7}, {0x0, r8}, {}, {r7, r8}, {}, {r7}, {}, {r6, r8}, {}, {r7, r8}, {}, {}, {r7}, {r7}, {0x0, r8}, {r7}, {}, {}, {r7}, {}, {r6}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {r6}, {r6}, {0x0, r8}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {r6, r8}, {r6}, {r6}, {0x0, r8}, {r7, r8}, {r6}, {r7}, {}, {r6}, {r7, r8}, {r7, r8}, {r7}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {r6}, {}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {r7}, {r6, r8}, {}, {r7}, {}, {r6}, {}, {0x0, r8}, {r6}, {r6}, {}, {}, {}, {r6, r8}, {}, {}, {}, {}, {r7, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {0x0, r9}, {0x0, r8}], 0x5, "7afd49454d79ef"}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 09:19:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) 09:19:07 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:07 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) 09:19:07 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 136.459564][T19283] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.479033][T19298] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 136.488667][T19289] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:07 executing program 5: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000100), 0x9, 0x10000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) r4 = socket$inet(0x2, 0x3, 0x1) r5 = dup(r4) sendmmsg$unix(r5, &(0x7f00000015c0)=[{{&(0x7f0000001280)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001300)='ru', 0x2}], 0x1, &(0x7f00000014c0)=[@rights={{0x10}}, @cred={{0x1c, 0x2, 0x2, {0x0, 0xee01}}}], 0x30}}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000400)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="332e68f6823722840ad48278ad0e420c599010dfceabf8dda6328d243e7784dbd72002dde98af0692017ff9af31618e1be2cf6e23e1bf044f5674fa27972a13254fe46438752c3dedae2b8ad674b3c2d5e5e6e1fa9e921d2de2f73fc58457501c1175d95c62e436b45f5ec356bafeac284dba2da378b88bf1cbec57475ab7600cc7f942eb6b11cdcfbababd026f84aea0ee378a2cfecb3b5cabbb8d41bd6173da5af6694f196653be47992b2f0f5225599997f61b4b20e3f2de51a0ac09b6d86bd81a2dbdb5392e3c2755680650918971d354bae", 0xd4, 0x8004, &(0x7f00000001c0)={0xa, 0x4e21, 0x3, @mcast1, 0xffff}, 0x1c) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x21, 0xb7, 0x0, 0x0, 0x4, 0x0, 0x3e0000, 0x8}, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000003190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101001, 0x58) [ 136.546031][T19305] loop1: detected capacity change from 0 to 264192 [ 136.576312][T19311] loop3: detected capacity change from 0 to 264192 [ 136.588782][ T5609] loop1: p2 < > p4 09:19:07 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="12f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:07 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) 09:19:07 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) 09:19:07 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x204000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 136.594075][ T5609] loop1: p4 size 2097152 extends beyond EOD, truncated [ 136.605954][T19305] loop1: p2 < > p4 [ 136.610272][T19311] loop3: p2 < > p4 [ 136.611317][T19289] loop0: detected capacity change from 0 to 1 [ 136.620483][T19311] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.627756][T19305] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:07 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x204000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:07 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) [ 136.684683][T19420] loop3: detected capacity change from 0 to 264192 [ 136.700461][T19422] loop1: detected capacity change from 0 to 264192 [ 136.705216][T19424] loop0: detected capacity change from 0 to 1 [ 136.718801][T19422] loop1: p2 < > p4 [ 136.723135][T19422] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:07 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x300000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 136.748719][ T380] loop3: p2 < > p4 [ 136.753906][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.762989][T19420] loop3: p2 < > p4 [ 136.767372][T19420] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.775129][T19424] loop0: p2 < > p4 [ 136.779276][T19424] loop0: p2 size 2 extends beyond EOD, truncated [ 136.792044][T19424] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x5, 0x1, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x4, 0x6, 0x4, 0xd1, 0xffffff96, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff8}) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0xd51e5cb0c90d1774, 0x80, 0x6, 0x6, 0xc4, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x40, 0x3f}, 0x10200, 0x4, 0x81, 0x3, 0x10001, 0x1, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff002) r4 = dup2(r2, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x1, 0x8, 0x6, 0x0, 0x1, 0x4008c, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x800, 0x81}, 0x48b08, 0x3fd, 0x3, 0x6, 0xb9b9, 0x4, 0x203, 0x0, 0xc0a5, 0x0, 0xe7af}, r2, 0xa, 0xffffffffffffffff, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000059180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059380)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "537667ed991d7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f000005a380)={{0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x5, 0xeb, 0x9, 0x2, 0x9, 0x9, 0x80, 0x54, 0xffffffff, 0x5, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}, {}, {}, {r9, r10}], 0x88, "f701e04acc836c"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') listen(r4, 0x7fff) preadv(r11, &(0x7f00000017c0), 0x331, 0x74000000, 0x0) 09:19:07 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x300000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:07 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="21f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 136.796054][T19529] loop1: detected capacity change from 0 to 264192 [ 136.806683][ T380] loop3: p2 < > p4 [ 136.821640][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 136.843844][T19529] loop1: p2 < > p4 09:19:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 1) [ 136.859455][T19529] loop1: p4 size 2097152 extends beyond EOD, truncated [ 136.877730][T19603] FAULT_INJECTION: forcing a failure. [ 136.877730][T19603] name failslab, interval 1, probability 0, space 0, times 0 [ 136.878599][T19573] loop0: detected capacity change from 0 to 1 [ 136.890352][T19603] CPU: 1 PID: 19603 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 09:19:07 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 1) [ 136.890377][T19603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.890387][T19603] Call Trace: [ 136.890394][T19603] dump_stack_lvl+0xd6/0x122 [ 136.890461][T19603] dump_stack+0x11/0x1b [ 136.890484][T19603] should_fail+0x23c/0x250 [ 136.890500][T19603] ? getname_flags+0x84/0x3f0 [ 136.924002][T19637] FAULT_INJECTION: forcing a failure. [ 136.924002][T19637] name failslab, interval 1, probability 0, space 0, times 0 [ 136.927270][T19603] __should_failslab+0x81/0x90 [ 136.927295][T19603] should_failslab+0x5/0x20 [ 136.958195][T19603] kmem_cache_alloc+0x4f/0x300 [ 136.962949][T19603] ? __cond_resched+0x11/0x40 [ 136.967699][T19603] getname_flags+0x84/0x3f0 [ 136.972189][T19603] __x64_sys_mkdir+0x31/0x50 [ 136.976772][T19603] do_syscall_64+0x44/0xa0 [ 136.981237][T19603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.987189][T19603] RIP: 0033:0x7f8ca5466b47 [ 136.991583][T19603] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.011248][T19603] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 137.019856][T19603] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 137.027810][T19603] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 137.035777][T19603] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 137.043812][T19603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 137.051766][T19603] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 137.059758][T19637] CPU: 0 PID: 19637 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 137.068614][T19637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.078657][T19637] Call Trace: [ 137.082008][T19637] dump_stack_lvl+0xd6/0x122 [ 137.086658][T19637] dump_stack+0x11/0x1b [ 137.090796][T19637] should_fail+0x23c/0x250 [ 137.095226][T19637] ? getname_flags+0x84/0x3f0 [ 137.099898][T19637] __should_failslab+0x81/0x90 [ 137.104719][T19637] should_failslab+0x5/0x20 [ 137.109204][T19637] kmem_cache_alloc+0x4f/0x300 [ 137.113980][T19637] ? __cond_resched+0x11/0x40 [ 137.118688][T19637] getname_flags+0x84/0x3f0 [ 137.123194][T19637] __x64_sys_mkdir+0x31/0x50 [ 137.127782][T19637] do_syscall_64+0x44/0xa0 [ 137.132222][T19637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.138102][T19637] RIP: 0033:0x7f8d96439b47 [ 137.142504][T19637] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.162094][T19637] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 137.170488][T19637] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 137.178443][T19637] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 137.186394][T19637] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 137.194346][T19637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 137.202296][T19637] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 09:19:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 2) [ 137.218358][ T380] loop0: p2 < > p4 [ 137.219234][T19640] loop3: detected capacity change from 0 to 264192 [ 137.230224][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 137.242628][T19642] FAULT_INJECTION: forcing a failure. [ 137.242628][T19642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.255753][T19642] CPU: 0 PID: 19642 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 137.264556][T19642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.271848][T19646] FAULT_INJECTION: forcing a failure. [ 137.271848][T19646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.274683][T19642] Call Trace: [ 137.274691][T19642] dump_stack_lvl+0xd6/0x122 [ 137.295536][T19642] dump_stack+0x11/0x1b [ 137.299730][T19642] should_fail+0x23c/0x250 [ 137.304153][T19642] should_fail_usercopy+0x16/0x20 [ 137.309163][T19642] strncpy_from_user+0x21/0x250 [ 137.314095][T19642] getname_flags+0xb8/0x3f0 [ 137.318656][T19642] __x64_sys_mkdir+0x31/0x50 [ 137.323393][T19642] do_syscall_64+0x44/0xa0 [ 137.327898][T19642] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.333790][T19642] RIP: 0033:0x7f8ca5466b47 [ 137.338325][T19642] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.357951][T19642] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 09:19:07 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:07 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 2) [ 137.366359][T19642] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 137.374317][T19642] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 137.382269][T19642] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 137.390228][T19642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 137.398178][T19642] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 137.406137][T19646] CPU: 1 PID: 19646 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 137.409845][T19645] loop1: detected capacity change from 0 to 264192 [ 137.415001][T19646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.415013][T19646] Call Trace: [ 137.415019][T19646] dump_stack_lvl+0xd6/0x122 [ 137.433580][ T380] loop0: p4 size 2097152 extends beyond EOD, [ 137.434875][T19646] dump_stack+0x11/0x1b [ 137.434896][T19646] should_fail+0x23c/0x250 [ 137.434914][T19646] should_fail_usercopy+0x16/0x20 [ 137.439496][ T380] truncated [ 137.445597][T19646] strncpy_from_user+0x21/0x250 [ 137.467131][T19646] getname_flags+0xb8/0x3f0 [ 137.471622][T19646] __x64_sys_mkdir+0x31/0x50 [ 137.476220][T19646] do_syscall_64+0x44/0xa0 [ 137.480633][T19646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.486588][T19646] RIP: 0033:0x7f8d96439b47 [ 137.491007][T19646] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.510594][T19646] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 09:19:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 3) [ 137.518993][T19646] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 137.526944][T19646] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 137.535045][T19646] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 137.543002][T19646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 137.551066][T19646] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 [ 137.561452][T19573] loop0: p2 < > p4 [ 137.565473][T19573] loop0: p2 size 2 extends beyond EOD, truncated [ 137.572259][T19640] loop3: p2 < > p4 [ 137.572520][T19573] loop0: p4 size 2097152 extends beyond EOD, truncated [ 137.576595][T19640] loop3: p4 size 2097152 extends beyond EOD, truncated [ 137.594342][T19648] FAULT_INJECTION: forcing a failure. [ 137.594342][T19648] name failslab, interval 1, probability 0, space 0, times 0 [ 137.606979][T19648] CPU: 0 PID: 19648 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 137.615729][T19648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.625770][T19648] Call Trace: [ 137.629081][T19648] dump_stack_lvl+0xd6/0x122 [ 137.633662][T19648] dump_stack+0x11/0x1b [ 137.637824][T19648] should_fail+0x23c/0x250 [ 137.642218][T19648] ? __d_alloc+0x36/0x370 [ 137.646530][T19648] __should_failslab+0x81/0x90 [ 137.651335][T19648] should_failslab+0x5/0x20 [ 137.655905][T19648] kmem_cache_alloc+0x4f/0x300 [ 137.660685][T19648] __d_alloc+0x36/0x370 [ 137.664834][T19648] d_alloc+0x2a/0x130 [ 137.668843][T19648] __lookup_hash+0x8f/0x180 [ 137.673334][T19648] filename_create+0xfc/0x270 [ 137.677988][T19648] do_mkdirat+0x53/0x2c0 [ 137.682260][T19648] __x64_sys_mkdir+0x40/0x50 [ 137.686833][T19648] do_syscall_64+0x44/0xa0 [ 137.691289][T19648] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.697257][T19648] RIP: 0033:0x7f8ca5466b47 09:19:08 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 3) [ 137.701654][T19648] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.721239][T19648] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 137.729630][T19648] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 137.737580][T19648] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 137.745530][T19648] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 137.753509][T19648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 137.761462][T19648] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 137.771805][ T380] loop1: p2 < > p4 [ 137.776235][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 137.787365][ T380] loop1: p2 < > p4 [ 137.794396][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 137.799055][T19650] FAULT_INJECTION: forcing a failure. [ 137.799055][T19650] name failslab, interval 1, probability 0, space 0, times 0 09:19:08 executing program 4: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) keyctl$set_reqkey_keyring(0xe, 0x0) keyctl$set_reqkey_keyring(0xe, 0x6) keyctl$set_reqkey_keyring(0xe, 0x7ffffffffffffffa) keyctl$set_reqkey_keyring(0xe, 0x5) keyctl$set_reqkey_keyring(0xe, 0x5) keyctl$set_reqkey_keyring(0xe, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$set_reqkey_keyring(0xe, 0x5) keyctl$set_reqkey_keyring(0xe, 0x0) keyctl$set_reqkey_keyring(0xe, 0x6) keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$set_reqkey_keyring(0xe, 0x6) keyctl$set_reqkey_keyring(0xe, 0x6) 09:19:08 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f603020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:08 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 4) [ 137.813862][T19650] CPU: 1 PID: 19650 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 137.822651][T19650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.832701][T19650] Call Trace: [ 137.835970][T19650] dump_stack_lvl+0xd6/0x122 [ 137.840642][T19650] dump_stack+0x11/0x1b [ 137.844811][T19650] should_fail+0x23c/0x250 [ 137.849224][T19650] ? __d_alloc+0x36/0x370 [ 137.853705][T19650] __should_failslab+0x81/0x90 [ 137.858473][T19650] should_failslab+0x5/0x20 [ 137.862979][T19650] kmem_cache_alloc+0x4f/0x300 [ 137.865794][T19656] FAULT_INJECTION: forcing a failure. [ 137.865794][T19656] name failslab, interval 1, probability 0, space 0, times 0 [ 137.867808][T19650] __d_alloc+0x36/0x370 [ 137.867832][T19650] d_alloc+0x2a/0x130 [ 137.888522][T19650] __lookup_hash+0x8f/0x180 [ 137.893034][T19650] filename_create+0xfc/0x270 [ 137.897760][T19650] do_mkdirat+0x53/0x2c0 [ 137.902018][T19650] __x64_sys_mkdir+0x40/0x50 [ 137.906722][T19650] do_syscall_64+0x44/0xa0 [ 137.911174][T19650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.917062][T19650] RIP: 0033:0x7f8d96439b47 [ 137.921478][T19650] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.941067][T19650] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 137.949466][T19650] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 137.957419][T19650] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 137.965372][T19650] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 137.973326][T19650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 137.981279][T19650] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 [ 137.989324][T19656] CPU: 0 PID: 19656 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 137.993475][T19657] loop0: detected capacity change from 0 to 1 [ 137.998085][T19656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.008261][T19658] loop3: detected capacity change from 0 to 264192 [ 138.014193][T19656] Call Trace: [ 138.014202][T19656] dump_stack_lvl+0xd6/0x122 [ 138.028544][T19656] dump_stack+0x11/0x1b [ 138.032751][T19656] should_fail+0x23c/0x250 [ 138.037169][T19656] ? ext4_alloc_inode+0x27/0x300 [ 138.042106][T19656] __should_failslab+0x81/0x90 [ 138.046896][T19656] ? set_qf_name+0x230/0x230 [ 138.051566][T19656] should_failslab+0x5/0x20 [ 138.056117][T19656] kmem_cache_alloc+0x4f/0x300 [ 138.061182][T19656] ? ebitmap_destroy+0x91/0xa0 [ 138.065954][T19656] ? set_qf_name+0x230/0x230 [ 138.069932][T19663] FAULT_INJECTION: forcing a failure. [ 138.069932][T19663] name failslab, interval 1, probability 0, space 0, times 0 [ 138.070567][T19656] ext4_alloc_inode+0x27/0x300 [ 138.070591][T19656] ? set_qf_name+0x230/0x230 [ 138.092503][T19656] new_inode_pseudo+0x38/0x1c0 [ 138.097315][T19656] new_inode+0x21/0x120 [ 138.101456][T19656] __ext4_new_inode+0x13f/0x2fd0 [ 138.106412][T19656] ? __dquot_initialize+0x13d/0x7f0 [ 138.111603][T19656] ext4_mkdir+0x28a/0x760 [ 138.115979][T19656] vfs_mkdir+0x2c3/0x3e0 [ 138.120208][T19656] do_mkdirat+0x12e/0x2c0 [ 138.124613][T19656] __x64_sys_mkdir+0x40/0x50 [ 138.129191][T19656] do_syscall_64+0x44/0xa0 [ 138.133648][T19656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.139529][T19656] RIP: 0033:0x7f8ca5466b47 [ 138.143981][T19656] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.163583][T19656] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 09:19:08 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 4) 09:19:08 executing program 4: eventfd2(0x30e7c, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x130, r1, 0x400, 0xffffffff, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x11c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x118, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '%:^\xa1)-)\\)][\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x38}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x879}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x219c}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1677}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) write(r0, &(0x7f0000000080)="90f7bee2e4d2609bb9a9b8863535da1c39a191ab20872758917bd7dbe2aff1b08da65bd9c09b8b57370e57fab8e8a07580df377ba2872d8d90dca0c4937a191c057412d699832e12d43301183f47951b6f9952f152f1022ae09ce034befc6056b93f4a168347f2ade5aacf2296f20e3d39a061d4dc6c4e676f68147511e23f5a2a4c8312152177fbbcb3fd1330308e56b6a8e6962f2abc4d9d8f3fca681d289851813f05d53b640ce41fbd996996efeaeed4adb626317adfb5b6c598938be5b272a35e488b1cfc9c43f07ac0742bc0b27dd34e7d8d0414409daf2e6ede9b3b06a3da", 0xab) socketpair(0x10, 0x0, 0x8, &(0x7f0000000000)) [ 138.171976][T19656] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 138.179936][T19656] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 138.187930][T19656] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 138.195889][T19656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 138.203869][T19656] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 138.211842][T19663] CPU: 1 PID: 19663 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 138.218857][T19645] loop1: p2 < > p4 [ 138.220629][T19663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.225028][T19645] loop1: p4 size 2097152 extends beyond EOD, [ 138.234481][T19663] Call Trace: [ 138.234490][T19663] dump_stack_lvl+0xd6/0x122 [ 138.234513][T19663] dump_stack+0x11/0x1b [ 138.240601][T19645] truncated [ 138.243873][T19663] should_fail+0x23c/0x250 [ 138.260154][T19663] ? ext4_alloc_inode+0x27/0x300 [ 138.265091][T19663] __should_failslab+0x81/0x90 [ 138.269959][T19663] ? set_qf_name+0x230/0x230 [ 138.274654][T19663] should_failslab+0x5/0x20 [ 138.279165][T19663] kmem_cache_alloc+0x4f/0x300 [ 138.283994][T19663] ? ebitmap_destroy+0x91/0xa0 [ 138.288746][T19663] ? set_qf_name+0x230/0x230 [ 138.293326][T19663] ext4_alloc_inode+0x27/0x300 [ 138.298089][T19663] ? set_qf_name+0x230/0x230 [ 138.302664][T19663] new_inode_pseudo+0x38/0x1c0 [ 138.307429][T19663] new_inode+0x21/0x120 [ 138.311586][T19663] __ext4_new_inode+0x13f/0x2fd0 [ 138.316526][T19663] ? __dquot_initialize+0x13d/0x7f0 [ 138.321714][T19663] ext4_mkdir+0x28a/0x760 [ 138.326245][T19663] vfs_mkdir+0x2c3/0x3e0 [ 138.330591][T19663] do_mkdirat+0x12e/0x2c0 [ 138.334977][T19663] __x64_sys_mkdir+0x40/0x50 [ 138.339552][T19663] do_syscall_64+0x44/0xa0 [ 138.343996][T19663] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.349897][T19663] RIP: 0033:0x7f8d96439b47 [ 138.354305][T19663] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:19:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 5) [ 138.373908][T19663] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 138.382696][T19663] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 138.390656][T19663] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 138.398611][T19663] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 138.406564][T19663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 138.414530][T19663] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 09:19:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)="8f372b46274de83b1a66fcff91f699bf921347fe", 0x14, 0x2}, {0x0, 0x0, 0x10000000000197}], 0x8100, &(0x7f0000000200)) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) 09:19:09 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 138.424401][T19658] loop3: p2 < > p4 [ 138.431925][ T380] loop0: p2 < > p4 [ 138.435998][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 138.438153][T19658] loop3: p4 size 2097152 extends beyond EOD, truncated [ 138.454527][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 138.459797][T19670] loop4: detected capacity change from 0 to 65537 [ 138.469101][T19668] FAULT_INJECTION: forcing a failure. 09:19:09 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 5) [ 138.469101][T19668] name failslab, interval 1, probability 0, space 0, times 0 [ 138.481726][T19668] CPU: 0 PID: 19668 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 138.489949][T19672] FAULT_INJECTION: forcing a failure. [ 138.489949][T19672] name failslab, interval 1, probability 0, space 0, times 0 [ 138.490643][T19668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.490656][T19668] Call Trace: [ 138.490663][T19668] dump_stack_lvl+0xd6/0x122 [ 138.521088][T19668] dump_stack+0x11/0x1b [ 138.525233][T19668] should_fail+0x23c/0x250 [ 138.529676][T19668] ? security_inode_alloc+0x30/0x180 [ 138.534946][T19668] __should_failslab+0x81/0x90 [ 138.539786][T19668] should_failslab+0x5/0x20 [ 138.544273][T19668] kmem_cache_alloc+0x4f/0x300 [ 138.549095][T19668] security_inode_alloc+0x30/0x180 [ 138.554225][T19668] inode_init_always+0x20b/0x430 [ 138.559161][T19668] ? set_qf_name+0x230/0x230 [ 138.563734][T19668] new_inode_pseudo+0x73/0x1c0 [ 138.568486][T19668] new_inode+0x21/0x120 [ 138.572680][T19668] __ext4_new_inode+0x13f/0x2fd0 [ 138.577610][T19668] ? __dquot_initialize+0x13d/0x7f0 [ 138.582864][T19668] ext4_mkdir+0x28a/0x760 [ 138.587178][T19668] vfs_mkdir+0x2c3/0x3e0 [ 138.591409][T19668] do_mkdirat+0x12e/0x2c0 [ 138.595778][T19668] __x64_sys_mkdir+0x40/0x50 [ 138.600352][T19668] do_syscall_64+0x44/0xa0 [ 138.604760][T19668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.610639][T19668] RIP: 0033:0x7f8ca5466b47 [ 138.615253][T19668] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.634958][T19668] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 138.643377][T19668] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 138.651403][T19668] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 138.659360][T19668] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 138.667326][T19668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 138.675291][T19668] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 138.683277][T19672] CPU: 1 PID: 19672 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 138.690857][T19657] loop0: p2 < > p4 [ 138.692039][T19672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.692051][T19672] Call Trace: [ 138.692057][T19672] dump_stack_lvl+0xd6/0x122 [ 138.692081][T19672] dump_stack+0x11/0x1b [ 138.696194][T19657] loop0: p2 size 2 extends beyond EOD, [ 138.706049][T19672] should_fail+0x23c/0x250 [ 138.706075][T19672] ? security_inode_alloc+0x30/0x180 [ 138.706095][T19672] __should_failslab+0x81/0x90 [ 138.706112][T19672] should_failslab+0x5/0x20 [ 138.709397][T19657] truncated [ 138.713952][T19672] kmem_cache_alloc+0x4f/0x300 [ 138.731088][T19657] loop0: p4 size 2097152 extends beyond EOD, [ 138.733300][T19672] security_inode_alloc+0x30/0x180 [ 138.733327][T19672] inode_init_always+0x20b/0x430 [ 138.738078][T19657] truncated [ 138.742543][T19672] ? set_qf_name+0x230/0x230 [ 138.774093][T19672] new_inode_pseudo+0x73/0x1c0 [ 138.778864][T19672] new_inode+0x21/0x120 [ 138.783022][T19672] __ext4_new_inode+0x13f/0x2fd0 [ 138.788260][T19672] ? __dquot_initialize+0x13d/0x7f0 [ 138.793482][T19672] ext4_mkdir+0x28a/0x760 [ 138.797802][T19672] vfs_mkdir+0x2c3/0x3e0 [ 138.802046][T19672] do_mkdirat+0x12e/0x2c0 [ 138.806384][T19672] __x64_sys_mkdir+0x40/0x50 [ 138.810997][T19672] do_syscall_64+0x44/0xa0 [ 138.815437][T19672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.821352][T19672] RIP: 0033:0x7f8d96439b47 [ 138.825750][T19672] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.845376][T19672] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 138.853768][T19672] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 138.861736][T19672] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 09:19:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 6) [ 138.869688][T19672] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 138.877668][T19672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 138.885685][T19672] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 [ 138.897069][T19677] loop1: detected capacity change from 0 to 264192 [ 138.897536][T19678] FAULT_INJECTION: forcing a failure. [ 138.897536][T19678] name failslab, interval 1, probability 0, space 0, times 0 [ 138.914295][T19670] loop4: detected capacity change from 0 to 65537 09:19:09 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 6) 09:19:09 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:09 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f604020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 138.916247][T19678] CPU: 1 PID: 19678 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 138.931393][T19678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.941446][T19678] Call Trace: [ 138.944772][T19678] dump_stack_lvl+0xd6/0x122 [ 138.949421][T19678] dump_stack+0x11/0x1b [ 138.953580][T19678] should_fail+0x23c/0x250 [ 138.957992][T19678] ? jbd2__journal_start+0xf7/0x3b0 [ 138.963198][T19678] __should_failslab+0x81/0x90 [ 138.966610][T19682] loop3: detected capacity change from 0 to 264192 [ 138.968045][T19678] should_failslab+0x5/0x20 [ 138.968068][T19678] kmem_cache_alloc+0x4f/0x300 [ 138.977216][T19683] FAULT_INJECTION: forcing a failure. [ 138.977216][T19683] name failslab, interval 1, probability 0, space 0, times 0 [ 138.979104][T19678] ? find_group_orlov+0x8ea/0x930 [ 138.979127][T19678] jbd2__journal_start+0xf7/0x3b0 [ 138.979149][T19678] __ext4_journal_start_sb+0x159/0x2d0 [ 139.011871][T19678] __ext4_new_inode+0xd9c/0x2fd0 [ 139.016918][T19678] ext4_mkdir+0x28a/0x760 [ 139.021235][T19678] vfs_mkdir+0x2c3/0x3e0 [ 139.025464][T19678] do_mkdirat+0x12e/0x2c0 [ 139.029780][T19678] __x64_sys_mkdir+0x40/0x50 [ 139.034355][T19678] do_syscall_64+0x44/0xa0 [ 139.038823][T19678] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.044725][T19678] RIP: 0033:0x7f8ca5466b47 [ 139.049123][T19678] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.068790][T19678] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 139.077183][T19678] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 139.085139][T19678] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 139.093092][T19678] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 139.101043][T19678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 139.108994][T19678] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 139.117164][T19683] CPU: 0 PID: 19683 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 139.117188][T19678] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory [ 139.125962][T19683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.125973][T19683] Call Trace: [ 139.125979][T19683] dump_stack_lvl+0xd6/0x122 [ 139.152052][T19683] dump_stack+0x11/0x1b [ 139.156215][T19683] should_fail+0x23c/0x250 [ 139.160634][T19683] ? jbd2__journal_start+0xf7/0x3b0 [ 139.165877][T19683] __should_failslab+0x81/0x90 [ 139.168920][T19686] FAULT_INJECTION: forcing a failure. [ 139.168920][T19686] name failslab, interval 1, probability 0, space 0, times 0 [ 139.170727][T19683] should_failslab+0x5/0x20 [ 139.187880][T19683] kmem_cache_alloc+0x4f/0x300 [ 139.192642][T19683] ? find_group_orlov+0x8ea/0x930 [ 139.197747][T19683] jbd2__journal_start+0xf7/0x3b0 [ 139.202916][T19683] __ext4_journal_start_sb+0x159/0x2d0 [ 139.208449][T19683] __ext4_new_inode+0xd9c/0x2fd0 [ 139.213403][T19683] ext4_mkdir+0x28a/0x760 [ 139.217729][T19683] vfs_mkdir+0x2c3/0x3e0 [ 139.222021][T19683] do_mkdirat+0x12e/0x2c0 [ 139.226342][T19683] __x64_sys_mkdir+0x40/0x50 [ 139.230933][T19683] do_syscall_64+0x44/0xa0 [ 139.235350][T19683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.241242][T19683] RIP: 0033:0x7f8d96439b47 [ 139.245644][T19683] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.265238][T19683] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 139.273720][T19683] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 139.281976][T19683] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 139.289956][T19683] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 139.297923][T19683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 139.305961][T19683] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 [ 139.313926][T19686] CPU: 1 PID: 19686 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 09:19:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 7) 09:19:09 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 7) [ 139.314006][T19683] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory [ 139.322682][T19686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.322693][T19686] Call Trace: [ 139.322699][T19686] dump_stack_lvl+0xd6/0x122 [ 139.322720][T19686] dump_stack+0x11/0x1b [ 139.336737][T19687] loop0: detected capacity change from 0 to 1 [ 139.340976][T19686] should_fail+0x23c/0x250 [ 139.341001][T19686] ? sidtab_sid2str_get+0x9c/0x130 [ 139.341020][T19686] __should_failslab+0x81/0x90 [ 139.366532][T19689] FAULT_INJECTION: forcing a failure. [ 139.366532][T19689] name failslab, interval 1, probability 0, space 0, times 0 [ 139.368732][T19686] should_failslab+0x5/0x20 [ 139.390566][T19686] __kmalloc_track_caller+0x6d/0x350 [ 139.395945][T19686] kmemdup+0x21/0x50 [ 139.399883][T19686] sidtab_sid2str_get+0x9c/0x130 [ 139.404806][T19686] security_sid_to_context_core+0x1cb/0x2d0 [ 139.410690][T19686] security_sid_to_context_force+0x2f/0x40 [ 139.416532][T19686] selinux_inode_init_security+0x4e4/0x590 [ 139.422366][T19686] security_inode_init_security+0xe4/0x260 [ 139.428211][T19686] ? ext4_init_security+0x40/0x40 [ 139.433253][T19686] ext4_init_security+0x30/0x40 [ 139.438140][T19686] __ext4_new_inode+0x2a0b/0x2fd0 [ 139.443155][T19686] ext4_mkdir+0x28a/0x760 [ 139.447470][T19686] vfs_mkdir+0x2c3/0x3e0 [ 139.451699][T19686] do_mkdirat+0x12e/0x2c0 [ 139.456176][T19686] __x64_sys_mkdir+0x40/0x50 [ 139.460785][T19686] do_syscall_64+0x44/0xa0 [ 139.465187][T19686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.471083][T19686] RIP: 0033:0x7f8ca5466b47 [ 139.475486][T19686] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.495249][T19686] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 139.503650][T19686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 139.511669][T19686] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 139.519624][T19686] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 139.527576][T19686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 139.535528][T19686] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 139.543530][T19689] CPU: 0 PID: 19689 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 139.552296][T19689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.562375][T19689] Call Trace: [ 139.565678][T19689] dump_stack_lvl+0xd6/0x122 [ 139.567558][T19691] FAULT_INJECTION: forcing a failure. [ 139.567558][T19691] name failslab, interval 1, probability 0, space 0, times 0 [ 139.570288][T19689] dump_stack+0x11/0x1b [ 139.570310][T19689] should_fail+0x23c/0x250 [ 139.570328][T19689] ? sidtab_sid2str_get+0x9c/0x130 [ 139.596486][T19689] __should_failslab+0x81/0x90 [ 139.601256][T19689] should_failslab+0x5/0x20 [ 139.605747][T19689] __kmalloc_track_caller+0x6d/0x350 [ 139.611017][T19689] kmemdup+0x21/0x50 [ 139.614992][T19689] sidtab_sid2str_get+0x9c/0x130 [ 139.619929][T19689] security_sid_to_context_core+0x1cb/0x2d0 [ 139.625866][T19689] security_sid_to_context_force+0x2f/0x40 [ 139.631784][T19689] selinux_inode_init_security+0x4e4/0x590 [ 139.637621][T19689] security_inode_init_security+0xe4/0x260 [ 139.643459][T19689] ? ext4_init_security+0x40/0x40 [ 139.648471][T19689] ext4_init_security+0x30/0x40 [ 139.653374][T19689] __ext4_new_inode+0x2a0b/0x2fd0 [ 139.658452][T19689] ext4_mkdir+0x28a/0x760 [ 139.662783][T19689] vfs_mkdir+0x2c3/0x3e0 [ 139.667172][T19689] do_mkdirat+0x12e/0x2c0 [ 139.671494][T19689] __x64_sys_mkdir+0x40/0x50 [ 139.676122][T19689] do_syscall_64+0x44/0xa0 [ 139.680564][T19689] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.686461][T19689] RIP: 0033:0x7f8d96439b47 [ 139.690859][T19689] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.710492][T19689] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 139.718887][T19689] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 09:19:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 8) [ 139.726856][T19689] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 139.734812][T19689] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 139.742852][T19689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 139.750805][T19689] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 [ 139.758765][T19691] CPU: 1 PID: 19691 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 139.767632][T19691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.777714][T19691] Call Trace: [ 139.780986][T19691] dump_stack_lvl+0xd6/0x122 [ 139.785586][T19691] dump_stack+0x11/0x1b [ 139.789725][T19691] should_fail+0x23c/0x250 [ 139.794126][T19691] ? kcalloc+0x32/0x50 [ 139.798263][T19691] __should_failslab+0x81/0x90 [ 139.803100][T19691] should_failslab+0x5/0x20 [ 139.807594][T19691] __kmalloc+0x6f/0x350 [ 139.811787][T19691] ? __crc32c_le_base+0x250/0x350 [ 139.816817][T19691] kcalloc+0x32/0x50 [ 139.820713][T19691] ext4_find_extent+0x21c/0x7f0 [ 139.825622][T19691] ext4_ext_map_blocks+0x115/0x1ff0 [ 139.830801][T19691] ? ext4_inode_csum+0x410/0x490 [ 139.835725][T19691] ? ext4_es_lookup_extent+0x206/0x490 [ 139.841178][T19691] ext4_map_blocks+0x1cf/0xf00 [ 139.845957][T19691] ext4_getblk+0xc6/0x3e0 [ 139.850273][T19691] ext4_bread+0x28/0x100 [ 139.854499][T19691] ext4_append+0xd1/0x1c0 [ 139.858865][T19691] ext4_init_new_dir+0x177/0x500 [ 139.863785][T19691] ext4_mkdir+0x329/0x760 [ 139.868101][T19691] vfs_mkdir+0x2c3/0x3e0 [ 139.872352][T19691] do_mkdirat+0x12e/0x2c0 [ 139.876726][T19691] __x64_sys_mkdir+0x40/0x50 [ 139.881372][T19691] do_syscall_64+0x44/0xa0 [ 139.885780][T19691] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.891666][T19691] RIP: 0033:0x7f8ca5466b47 [ 139.896069][T19691] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.915665][T19691] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 139.924061][T19691] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 139.932045][T19691] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 139.939997][T19691] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 139.947952][T19691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 139.955904][T19691] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 139.965876][ T380] loop1: p2 < > p4 [ 139.966017][T19687] loop0: p2 < > p4 [ 139.970269][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:10 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r4 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r3, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0x788001c72798ad2, 0x700, 0x1ff, 0x3, {{0xf, 0x4, 0x3, 0x6, 0x3c, 0x64, 0x0, 0x40, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@noop, @lsrr={0x83, 0x7, 0xff, [@empty]}, @rr={0x7, 0x1b, 0x2d, [@loopback, @loopback, @dev={0xac, 0x14, 0x14, 0x3d}, @local, @multicast1, @local]}, @ra={0x94, 0x4, 0xa6cb}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000ac0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000200)={0x858, r1, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_WOL_SOPASS={0x75, 0x3, "d34e810339ad99eb9680aec659c0f30e925e880d941adfe129ef2799d4c45f4c3df7783766100d1d1f7d39c95fd19cf46102f1655e010079ccf2f835782cc519f16f29fa38ff1935b5abe32df2acb9649cad8ed1783080e1023ef2194ecf22ea8857576e2c5f9a1e6c1c87f6a61619b8f9"}, @ETHTOOL_A_WOL_HEADER={0x4}, @ETHTOOL_A_WOL_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x1a, 0x3, "d9b58392a4a2cdc514541349afd66455efb760bf27ec"}, @ETHTOOL_A_WOL_SOPASS={0xa1, 0x3, "aaa73c1381736834bbe4d28bebdfc1ce536bbdee8fad92f5a21d1e7e2b00b44f04f3dfb3c958472ba6d611341939f661ba287a75b5895eecd05f7b4ea08e84201fbce4326284dad8ec30806a9cd7e1a06fdfdd1740904152ab28c012fc5cdb54f2dfe08756bd7a4c2ca8a83797aebafc241637466b0f35acc024e94b7d7737a1e23672a89145cf545de2a2820004e62af34ca83346f41f61f1eb540902"}, @ETHTOOL_A_WOL_SOPASS={0x60, 0x3, "cf4f0cb1ea75083f76b808724eb4bb540b5ed345a1d64d95c803abf4d52fdce541dfcfec62db60f9248dabc35f92399ddad745d4b86f0b3b83ac6d5e699b9fa4d8823801c18fdc29c45d411ad97bc0fd6fa786490ae04a67b23e2c20"}, @ETHTOOL_A_WOL_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x4b0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x81}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0xbb, 0x5, "7189fc10e17b7eb1199bb2f7c5b26a315b5fa854f191b1c3cbf9281e01612ef8fe4e1c66fade400d8d747250a10cd752f47955bb0674cc75c1bafb07d55bd26f4d597cdef735a851d4e28e57e1b7a480c7fc0eb07dc090a718e463af1906a693fa3ae00636aa3b3431d8c2222c1eb7b5a6641dc89139ecf53bd9307d9f69bce210b874ea446ccbdf6b8c41b6a7ae57bd3a6ccde341ec136098065e972d99de5b6edbcba664e946930211674ea076645ab59bcc473c5260"}, @ETHTOOL_A_BITSET_MASK={0x47, 0x5, "f9244725aa30a49bac2e609c60a4f8055549f981ab2ff3abfbeda0c2302f74997d09574363ace64fa0478388ce771430692ad9a382b0ed02640e562c60dfa2609ca971"}, @ETHTOOL_A_BITSET_BITS={0x84, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, ')]$()(]-:]!\xab{\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '+!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'T,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\',-\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x15c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '](@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/!\xb0}:%$.$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\x17%-)*[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x62ddf79}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x4}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffe00}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4f5}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'J{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x59}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x4}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7684}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$.&@$*,\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '^$&^/\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\'[]\'{{^\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd1}]}]}, @ETHTOOL_A_BITSET_MASK={0x1b, 0x5, "70a1e115537c603b5ede6d7481888f2667a22420f77934"}, @ETHTOOL_A_BITSET_BITS={0xd0, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.:$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe68}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '[&#*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '],+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_WOL_MODES={0x108, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe5, 0x4, "7658aa275e43ae043f78436554843a851436a6f05d5d8b6c46b4f1d9a0ea6961513788a3822e5257a484584e18f715b3efacf90eb11d4f82cd8662d88c5a88e906d7a95ebf41819a385715f747fc2b96ba453186411848ac38b06da9fe932646005ffe2e5250588ea641874acdccd81f413b9534cf6599c1cf8354c3a70df4c2e9f2afa79dcd2c144b400fda11bdd0127b1469d90149bf3c1309280c640516534c9f3b3ba69e183376011367b148962f376d3a4ad9d40ef3a2b9c5e15e39629ba806780983951fd2b77f6e0a46d2f25f49bddf34f0fdb6ca6b89f0e933d6c8bcfc"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x39}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7ff}]}]}, 0x858}, 0x1, 0x0, 0x0, 0x20008084}, 0x48040) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getitimer(0x0, &(0x7f0000000140)) [ 139.974099][T19682] loop3: p2 < > p4 [ 139.985010][T19687] loop0: p2 size 2 extends beyond EOD, truncated [ 139.989600][T19682] loop3: p4 size 2097152 extends beyond EOD, truncated [ 139.998742][ T380] loop1: p2 < > p4 [ 140.006889][T19687] loop0: p4 size 2097152 extends beyond EOD, truncated [ 140.009065][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 140.022125][T19677] loop1: p2 < > p4 09:19:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 9) 09:19:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 8) [ 140.026412][T19677] loop1: p4 size 2097152 extends beyond EOD, truncated [ 140.041967][ T380] loop1: p2 < > p4 [ 140.046810][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 140.059768][T19698] FAULT_INJECTION: forcing a failure. [ 140.059768][T19698] name failslab, interval 1, probability 0, space 0, times 0 [ 140.072432][T19698] CPU: 1 PID: 19698 Comm: syz-executor.2 Not tainted 5.15.0-rc7-syzkaller #0 [ 140.081217][T19698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.091270][T19698] Call Trace: [ 140.094649][T19698] dump_stack_lvl+0xd6/0x122 [ 140.099266][T19698] dump_stack+0x11/0x1b [ 140.103438][T19698] should_fail+0x23c/0x250 [ 140.107903][T19698] ? kcalloc+0x32/0x50 [ 140.112049][T19698] __should_failslab+0x81/0x90 [ 140.116860][T19698] should_failslab+0x5/0x20 [ 140.121345][T19698] __kmalloc+0x6f/0x350 [ 140.125503][T19698] ? __crc32c_le_base+0x250/0x350 [ 140.130523][T19698] kcalloc+0x32/0x50 [ 140.134416][T19698] ext4_find_extent+0x21c/0x7f0 [ 140.139366][T19698] ext4_ext_map_blocks+0x115/0x1ff0 [ 140.144550][T19698] ? ext4_inode_csum+0x410/0x490 [ 140.149473][T19698] ? ext4_es_lookup_extent+0x206/0x490 [ 140.154914][T19698] ext4_map_blocks+0x1cf/0xf00 [ 140.159677][T19698] ext4_getblk+0xc6/0x3e0 [ 140.164059][T19698] ext4_bread+0x28/0x100 [ 140.168284][T19698] ext4_append+0xd1/0x1c0 [ 140.172661][T19698] ext4_init_new_dir+0x177/0x500 [ 140.177583][T19698] ext4_mkdir+0x329/0x760 [ 140.182036][T19698] vfs_mkdir+0x2c3/0x3e0 [ 140.186285][T19698] do_mkdirat+0x12e/0x2c0 [ 140.190605][T19698] __x64_sys_mkdir+0x40/0x50 [ 140.195198][T19698] do_syscall_64+0x44/0xa0 [ 140.199683][T19698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.205571][T19698] RIP: 0033:0x7f8d96439b47 [ 140.209973][T19698] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.229652][T19698] RSP: 002b:00007f8d941b0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 140.239589][T19698] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d96439b47 [ 140.247574][T19698] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 140.257090][T19698] RBP: 00007f8d941b1040 R08: 0000000000000000 R09: 0000000000000000 [ 140.265054][T19698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 140.273010][T19698] R13: 00000000200001c0 R14: 00007f8d941b1000 R15: 0000000020000180 [ 140.282022][T19696] FAULT_INJECTION: forcing a failure. [ 140.282022][T19696] name failslab, interval 1, probability 0, space 0, times 0 [ 140.294737][T19696] CPU: 0 PID: 19696 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 140.295117][ T22] kauditd_printk_skb: 17 callbacks suppressed [ 140.295127][ T22] audit: type=1326 audit(1635499150.928:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 09:19:10 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x600000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 140.303577][T19696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.303588][T19696] Call Trace: [ 140.303595][T19696] dump_stack_lvl+0xd6/0x122 [ 140.309764][ T22] audit: type=1326 audit(1635499150.928:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 140.333600][T19696] dump_stack+0x11/0x1b [ 140.344179][T19698] tmpfs: Unknown parameter 'hash' [ 140.346922][T19696] should_fail+0x23c/0x250 [ 140.346944][T19696] ? __es_insert_extent+0x51f/0xe70 [ 140.394074][T19696] __should_failslab+0x81/0x90 [ 140.398855][T19696] should_failslab+0x5/0x20 [ 140.403495][T19696] kmem_cache_alloc+0x4f/0x300 [ 140.408257][T19696] __es_insert_extent+0x51f/0xe70 [ 140.413265][T19696] ext4_es_insert_extent+0x1cb/0x1950 [ 140.418689][T19696] ext4_ext_map_blocks+0x100a/0x1ff0 [ 140.423969][T19696] ext4_map_blocks+0x1cf/0xf00 [ 140.428729][T19696] ext4_getblk+0xc6/0x3e0 [ 140.433166][T19696] ext4_bread+0x28/0x100 [ 140.437399][T19696] ext4_append+0xd1/0x1c0 [ 140.441754][T19696] ext4_init_new_dir+0x177/0x500 [ 140.446688][T19696] ext4_mkdir+0x329/0x760 [ 140.451017][T19696] vfs_mkdir+0x2c3/0x3e0 [ 140.455314][T19696] do_mkdirat+0x12e/0x2c0 [ 140.459664][T19696] __x64_sys_mkdir+0x40/0x50 [ 140.464327][T19696] do_syscall_64+0x44/0xa0 [ 140.468752][T19696] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.474634][T19696] RIP: 0033:0x7f8ca5466b47 [ 140.479046][T19696] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.498824][T19696] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 140.507305][T19696] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 140.515258][T19696] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 140.523245][T19696] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 09:19:11 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x600000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:11 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f606020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) (fail_nth: 9) [ 140.531326][T19696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 140.539280][T19696] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 140.556535][ T22] audit: type=1326 audit(1635499151.178:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=36 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 09:19:11 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 10) [ 140.595590][ T22] audit: type=1326 audit(1635499151.208:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 140.603664][T19704] loop0: detected capacity change from 0 to 1 [ 140.619552][ T22] audit: type=1326 audit(1635499151.208:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 140.649586][ T22] audit: type=1326 audit(1635499151.218:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 140.673399][ T22] audit: type=1326 audit(1635499151.218:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 140.697355][ T22] audit: type=1326 audit(1635499151.218:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 [ 140.721221][ T22] audit: type=1326 audit(1635499151.218:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 09:19:11 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000080)=ANY=[@ANYBLOB="757372f366c9ba6a71050000003d2c6e6f61636c2c8c"]) r0 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000700)=[{&(0x7f00000001c0), 0x0, 0x2}, {&(0x7f0000000200)="9d47935ad55d708ea33f2fd7906934abe0c9db95f017f7d88500846a7d6a9f3df310ed0b6a62d20afa0f496d6a492d9a92e812b96f965e038a638d803a", 0x3d, 0x3}, {&(0x7f0000000240)="f15771329939bcfe9a811c0f5fdcd69078bda4b13ea0204bab439ddcb6cda8fd0fb380c917807eba0fefc1a1ee7f5394e62c1af6d42342835d134f8c5ce900f01bbb191bc9f8cfb495fd287a591cc1c0f8864436c5abd1043231e823d634bdda87bea48f999a4f3135b6b646faae1fa69c62c0", 0x73, 0x9}, {&(0x7f00000002c0)="e5f7e684dc4c2d6b1fb11fcab879432199c93d086a04c858838a0304193a20348ab251632a893a1dc1a1edad373daaab85967eb022d82a1f8f85e1d3b7a1138543634d0cf8a5f7d1b2f265087ac1b43257", 0x51, 0x2}, {&(0x7f00000003c0)="fe5bf70490675f34ec63fd386d5fee3e2feeed38ef30648b1bbd8c76de736e42ef2c93e4152116c8096f1c2c2169ce67dd5a2f211dd3b1c150bf144751b5e19b560559e03a1cfcc8d36c67ee821817c38b718a5de25ce0e0130375789c2b52d35b8ebeda6a7069b78d8ece03cb93a4c03dd8c7e69e57ec3615994c99fc091928201f311d456ef0d1a4c7928c92c3d35f388dccf4e33f3f7c0bbc32c9d677a0691ddef2344356aa3e394b66cc669f14", 0xaf, 0x8}, {&(0x7f0000000340)="2cf641e2ae", 0x5, 0x5}, {&(0x7f0000000480)="79dcc6d4e55131e7f685cd6ef9c31542781335251ef7a6728f7884497cf3b8862555f4f17968825d69c7687bda3bff1116a14726cb97dbfd19e3a413fae210be5d3c477b2437bff8f0de8d459f1e9ef1c1c1a1417d554bf01ae0b678856bad3f5f376fb521ab404600d34d160bc5eee16ddc4d72063767102848e08cc73c9260c0ba2f60cdd6feed06a8a126135229f94488b7ca863173b4354384722f0f9c10710ec860c6801d06146383068e25de569d0748d4ba96511f76e0bc3b2902c3c83c5566d9669302b0b1510dee618a5bba58ed1bdfef0ce003a3691d0b807811762ded3f8e83dc59c18adac7e62b2032355f70ee53456b", 0xf6, 0x3}, {&(0x7f0000000580)="2f9d7db6d867bd197b839ecbaea10b21553168ee49905cd10ecb8b03b745c5f53efadaee4a176856071a7ca64c520b082182522075862aa82faf7c0c896e04de9bdf84275fee0a77b08fc282f62fd17e1a94308815b58b9cbe00fc005ae3559e23a8a1f6dbfbc27507079d544469f196470c9aed96741a61a642bef622ac77369b4acfb4247d60f84a9ab51c20edd85d792ef8693b7ce4922558c6f795f1edd511ad20fdd5ef17ff729471eca3a272b15ffe8a48613f2dece23eaa7df3d6f2497d52713bb2285f9cc3066e", 0xcb, 0x2}, {&(0x7f0000000680)="f2e95a28189ab65217f70307ee89b78fb49b930a18a8c37948f2268135cf0be99bd40f49206f96dfcf3926051aba86aef00fc9e0570ad2faae2b974d050c09086463543053f32e14cf38c8b8ba344274638534b8802e76d55e18957b", 0x5c}], 0x1000009, &(0x7f0000000800)={[{'ext4\x00'}], [{@obj_type={'obj_type', 0x3d, '$+#\''}}, {@measure}, {@permit_directio}, {@dont_appraise}, {@fowner_gt}, {@fowner_lt={'fowner<', 0xee01}}, {@measure}, {@obj_type}, {@audit}, {@seclabel}]}) faccessat2(r0, &(0x7f00000008c0)='./file0\x00', 0x106, 0xb00) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000001c0)=@v2={0x2, @aes128, 0x4, '\x00', @c}) [ 140.745082][ T22] audit: type=1326 audit(1635499151.218:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb1531ea39 code=0x7ffc0000 09:19:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 140.794093][T19807] loop3: detected capacity change from 0 to 264192 [ 140.808635][T19809] FAULT_INJECTION: forcing a failure. [ 140.808635][T19809] name failslab, interval 1, probability 0, space 0, times 0 [ 140.809001][ T380] loop0: p2 < > p4 [ 140.821353][T19809] CPU: 1 PID: 19809 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 140.831441][T19812] EXT4-fs (sda1): Unrecognized mount option "usrófɺjq" or missing value [ 140.833878][T19809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.833891][T19809] Call Trace: [ 140.833899][T19809] dump_stack_lvl+0xd6/0x122 [ 140.843558][ T380] loop0: p2 size 2 extends beyond EOD, [ 140.852478][T19809] dump_stack+0x11/0x1b [ 140.852501][T19809] should_fail+0x23c/0x250 [ 140.855770][ T380] truncated [ 140.857129][T19811] loop1: detected capacity change from 0 to 264192 [ 140.860335][T19809] ? kcalloc+0x32/0x50 [ 140.876401][ T380] loop0: p4 size 2097152 extends beyond EOD, [ 140.877664][T19809] __should_failslab+0x81/0x90 [ 140.877688][T19809] should_failslab+0x5/0x20 [ 140.884188][ T380] truncated [ 140.888205][T19809] __kmalloc+0x6f/0x350 [ 140.910672][T19809] kcalloc+0x32/0x50 [ 140.914573][T19809] ext4_find_extent+0x21c/0x7f0 [ 140.919465][T19809] ? kfree+0xf8/0x1d0 [ 140.923501][T19809] ext4_ext_map_blocks+0x115/0x1ff0 [ 140.928705][T19809] ext4_map_blocks+0x71e/0xf00 [ 140.933600][T19809] ext4_getblk+0xc6/0x3e0 [ 140.937920][T19809] ext4_bread+0x28/0x100 [ 140.942145][T19809] ext4_append+0xd1/0x1c0 [ 140.946458][T19809] ext4_init_new_dir+0x177/0x500 [ 140.951401][T19809] ext4_mkdir+0x329/0x760 [ 140.955713][T19809] vfs_mkdir+0x2c3/0x3e0 [ 140.959983][T19809] do_mkdirat+0x12e/0x2c0 [ 140.964333][T19809] __x64_sys_mkdir+0x40/0x50 [ 140.968910][T19809] do_syscall_64+0x44/0xa0 [ 140.973332][T19809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.979215][T19809] RIP: 0033:0x7f8ca5466b47 [ 140.983611][T19809] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.003198][T19809] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 141.011649][T19809] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 141.019599][T19809] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 141.027565][T19809] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 141.035780][T19809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 09:19:11 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 11) [ 141.043777][T19809] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 141.052835][T19814] nfs4: Unknown parameter 'ext4' [ 141.059304][T19704] loop0: p2 < > p4 [ 141.063296][T19704] loop0: p2 size 2 extends beyond EOD, truncated [ 141.071423][T19815] tmpfs: Unknown parameter 'hash' [ 141.079909][T19704] loop0: p4 size 2097152 extends beyond EOD, truncated [ 141.082840][T19811] loop1: p2 < > p4 [ 141.090846][T19807] loop3: p2 < > p4 09:19:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.096741][T19807] loop3: p4 size 2097152 extends beyond EOD, truncated [ 141.096986][T19814] EXT4-fs (sda1): Unrecognized mount option "usrófɺjq" or missing value [ 141.106224][T19811] loop1: p4 size 2097152 extends beyond EOD, truncated [ 141.128429][T19817] FAULT_INJECTION: forcing a failure. [ 141.128429][T19817] name failslab, interval 1, probability 0, space 0, times 0 09:19:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.141109][T19817] CPU: 1 PID: 19817 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 141.144211][T19819] tmpfs: Unknown parameter 'hash' [ 141.149864][T19817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.149876][T19817] Call Trace: [ 141.149883][T19817] dump_stack_lvl+0xd6/0x122 [ 141.149908][T19817] dump_stack+0x11/0x1b [ 141.176944][T19817] should_fail+0x23c/0x250 [ 141.178487][T19821] tmpfs: Unknown parameter 'hash' [ 141.181417][T19817] ? ext4_mb_new_blocks+0x317/0x1fc0 [ 141.181441][T19817] __should_failslab+0x81/0x90 09:19:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.196461][T19817] should_failslab+0x5/0x20 [ 141.201126][T19817] kmem_cache_alloc+0x4f/0x300 [ 141.205910][T19817] ext4_mb_new_blocks+0x317/0x1fc0 [ 141.211068][T19817] ? ext4_find_extent+0x6cf/0x7f0 [ 141.216093][T19817] ? ext4_ext_search_right+0x300/0x540 [ 141.218273][T19823] tmpfs: Unknown parameter 'hash' [ 141.221608][T19817] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 141.221635][T19817] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 141.221654][T19817] ext4_map_blocks+0x71e/0xf00 [ 141.221675][T19817] ext4_getblk+0xc6/0x3e0 [ 141.246690][T19817] ext4_bread+0x28/0x100 [ 141.250947][T19817] ext4_append+0xd1/0x1c0 [ 141.251802][T19825] tmpfs: Unknown parameter 'hash' [ 141.255280][T19817] ext4_init_new_dir+0x177/0x500 [ 141.255306][T19817] ext4_mkdir+0x329/0x760 [ 141.269539][T19817] vfs_mkdir+0x2c3/0x3e0 [ 141.273839][T19817] do_mkdirat+0x12e/0x2c0 [ 141.278227][T19817] __x64_sys_mkdir+0x40/0x50 [ 141.282828][T19817] do_syscall_64+0x44/0xa0 [ 141.287247][T19817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.293392][T19817] RIP: 0033:0x7f8ca5466b47 [ 141.297787][T19817] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.317404][T19817] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 141.325818][T19817] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 141.333770][T19817] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 141.341723][T19817] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 141.349671][T19817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 141.357756][T19817] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 141.366611][T19812] nfs4: Unknown parameter 'ext4' 09:19:12 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x604000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:12 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 12) 09:19:12 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x604000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:12 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f609020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.394183][T19811] loop1: detected capacity change from 0 to 264192 [ 141.462894][T19829] loop3: detected capacity change from 0 to 264192 [ 141.464540][T19831] loop0: detected capacity change from 0 to 1 [ 141.470372][T19833] FAULT_INJECTION: forcing a failure. [ 141.470372][T19833] name failslab, interval 1, probability 0, space 0, times 0 [ 141.476344][T19834] tmpfs: Unknown parameter 'hash' [ 141.488151][T19833] CPU: 1 PID: 19833 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 141.488173][T19833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:19:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.511961][T19833] Call Trace: [ 141.515249][T19833] dump_stack_lvl+0xd6/0x122 [ 141.519883][T19833] dump_stack+0x11/0x1b [ 141.524038][T19833] should_fail+0x23c/0x250 [ 141.528464][T19833] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 141.533648][T19838] tmpfs: Unknown parameter 'hash' [ 141.533749][T19833] __should_failslab+0x81/0x90 [ 141.543720][T19833] should_failslab+0x5/0x20 [ 141.548224][T19833] kmem_cache_alloc+0x4f/0x300 [ 141.551341][T19836] tmpfs: Unknown parameter 'hash' [ 141.552991][T19833] ext4_mb_new_blocks+0x73f/0x1fc0 09:19:12 executing program 4: semop(0x0, &(0x7f0000000080)=[{0x4, 0x0, 0x800}, {0x2, 0x4, 0x800}, {0x1, 0x9, 0x1800}, {0x2, 0x764, 0x1000}, {0x0, 0x4c69, 0x1800}, {0x3, 0x6}, {0x1, 0x4}, {0x4, 0x11, 0x800}], 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sync() [ 141.563206][T19833] ? ext4_find_extent+0x6cf/0x7f0 [ 141.568220][T19833] ? ext4_ext_search_right+0x300/0x540 [ 141.573700][T19833] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 141.579496][T19833] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 141.584781][T19833] ext4_map_blocks+0x71e/0xf00 [ 141.589604][T19833] ext4_getblk+0xc6/0x3e0 [ 141.593931][T19833] ext4_bread+0x28/0x100 [ 141.598280][T19833] ext4_append+0xd1/0x1c0 [ 141.602601][T19833] ext4_init_new_dir+0x177/0x500 [ 141.607594][T19833] ext4_mkdir+0x329/0x760 [ 141.611947][T19833] vfs_mkdir+0x2c3/0x3e0 [ 141.616261][T19833] do_mkdirat+0x12e/0x2c0 [ 141.620643][T19833] __x64_sys_mkdir+0x40/0x50 [ 141.625234][T19833] do_syscall_64+0x44/0xa0 [ 141.629642][T19833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.635582][T19833] RIP: 0033:0x7f8ca5466b47 [ 141.640025][T19833] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.659686][T19833] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 141.668082][T19833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 141.676052][T19833] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 141.684019][T19833] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 141.691998][T19833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 141.700176][T19833] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:12 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 13) [ 141.709662][T19840] tmpfs: Unknown parameter 'hash' [ 141.728734][ T380] loop0: p2 < > p4 [ 141.730433][T19829] loop3: p2 < > p4 [ 141.732663][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 141.737095][T19829] loop3: p4 size 2097152 extends beyond EOD, truncated [ 141.743501][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.759578][T19844] FAULT_INJECTION: forcing a failure. [ 141.759578][T19844] name failslab, interval 1, probability 0, space 0, times 0 [ 141.765388][T19846] loop1: detected capacity change from 0 to 264192 [ 141.772233][T19844] CPU: 1 PID: 19844 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 141.787496][T19844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.789695][ T380] loop0: p2 < > p4 [ 141.797650][T19844] Call Trace: [ 141.797659][T19844] dump_stack_lvl+0xd6/0x122 [ 141.809093][ T380] loop0: p2 size 2 extends beyond EOD, [ 141.809307][T19844] dump_stack+0x11/0x1b [ 141.809331][T19844] should_fail+0x23c/0x250 [ 141.814859][ T380] truncated [ 141.818978][T19844] ? __es_insert_extent+0x51f/0xe70 [ 141.827061][T19848] tmpfs: Unknown parameter 'hash' [ 141.832025][T19844] __should_failslab+0x81/0x90 [ 141.837296][ T380] loop0: p4 size 2097152 extends beyond EOD, [ 141.841804][T19844] should_failslab+0x5/0x20 [ 141.841823][T19844] kmem_cache_alloc+0x4f/0x300 [ 141.841841][T19844] __es_insert_extent+0x51f/0xe70 [ 141.841893][T19844] ext4_es_insert_extent+0x1cb/0x1950 [ 141.847949][ T380] truncated [ 141.870711][T19844] ext4_map_blocks+0xa5d/0xf00 [ 141.875469][T19844] ext4_getblk+0xc6/0x3e0 [ 141.879782][T19844] ext4_bread+0x28/0x100 [ 141.884059][T19844] ext4_append+0xd1/0x1c0 [ 141.888374][T19844] ext4_init_new_dir+0x177/0x500 [ 141.893348][T19844] ext4_mkdir+0x329/0x760 [ 141.897761][T19844] vfs_mkdir+0x2c3/0x3e0 [ 141.902004][T19844] do_mkdirat+0x12e/0x2c0 [ 141.906319][T19844] __x64_sys_mkdir+0x40/0x50 [ 141.910944][T19844] do_syscall_64+0x44/0xa0 [ 141.915444][T19844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.921333][T19844] RIP: 0033:0x7f8ca5466b47 [ 141.925746][T19844] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.945334][T19844] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 141.953810][T19844] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 09:19:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 141.961807][T19844] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 141.969762][T19844] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 141.977732][T19844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 [ 141.985845][T19844] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 141.996047][T19831] loop0: p2 < > p4 [ 142.000781][T19831] loop0: p2 size 2 extends beyond EOD, truncated 09:19:12 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x700000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:12 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 14) 09:19:12 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605030206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 142.012083][T19831] loop0: p4 size 2097152 extends beyond EOD, truncated [ 142.019861][T19846] loop1: p2 < > p4 [ 142.024546][T19850] tmpfs: Unknown parameter 'hash' [ 142.026089][T19846] loop1: p4 size 2097152 extends beyond EOD, truncated [ 142.049916][T19852] loop3: detected capacity change from 0 to 264192 [ 142.057351][T19850] tmpfs: Unknown parameter 'hash' [ 142.080709][T19855] FAULT_INJECTION: forcing a failure. [ 142.080709][T19855] name failslab, interval 1, probability 0, space 0, times 0 [ 142.093483][T19855] CPU: 0 PID: 19855 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 142.102243][T19855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.112316][T19855] Call Trace: [ 142.115589][T19855] dump_stack_lvl+0xd6/0x122 [ 142.120299][T19855] dump_stack+0x11/0x1b [ 142.124456][T19855] should_fail+0x23c/0x250 [ 142.128849][T19855] ? jbd2_journal_add_journal_head+0x6c/0x310 [ 142.134927][T19855] __should_failslab+0x81/0x90 [ 142.139677][T19855] should_failslab+0x5/0x20 [ 142.144171][T19855] kmem_cache_alloc+0x4f/0x300 [ 142.148953][T19855] jbd2_journal_add_journal_head+0x6c/0x310 [ 142.154905][T19855] jbd2_journal_get_create_access+0x2c/0x2f0 [ 142.160936][T19855] __ext4_journal_get_create_access+0x65/0x320 [ 142.167175][T19855] ext4_getblk+0x22b/0x3e0 [ 142.171570][T19855] ext4_bread+0x28/0x100 [ 142.175790][T19855] ext4_append+0xd1/0x1c0 [ 142.180096][T19855] ext4_init_new_dir+0x177/0x500 [ 142.185031][T19855] ext4_mkdir+0x329/0x760 [ 142.189347][T19855] vfs_mkdir+0x2c3/0x3e0 [ 142.193574][T19855] do_mkdirat+0x12e/0x2c0 [ 142.197904][T19855] __x64_sys_mkdir+0x40/0x50 [ 142.202507][T19855] do_syscall_64+0x44/0xa0 [ 142.206985][T19855] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.212921][T19855] RIP: 0033:0x7f8ca5466b47 [ 142.217321][T19855] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.237004][T19855] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 142.245398][T19855] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5466b47 [ 142.253417][T19855] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 142.261372][T19855] RBP: 00007f8ca31de040 R08: 0000000000000000 R09: 0000000000000000 [ 142.269363][T19855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001440 09:19:12 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x700000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:12 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) r1 = socket$inet6(0xa, 0x3, 0x1ff) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000240)=""/243, 0xf3}, {&(0x7f0000000340)=""/181, 0xb5}, {&(0x7f0000000400)=""/219, 0xdb}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000040)=""/121, 0x79}], 0x67) r2 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00'}) preadv(r2, &(0x7f0000002a40)=[{&(0x7f0000001500)=""/102, 0x66}, {&(0x7f0000001580)=""/149, 0x95}, {&(0x7f0000001640)=""/107, 0x6b}, {&(0x7f00000016c0)=""/130, 0x82}, {&(0x7f0000001780)=""/182, 0xb6}, {&(0x7f0000001840)=""/5, 0x5}, {&(0x7f0000001880)=""/232, 0xe8}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/164, 0xa4}], 0x9, 0x400, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000002b00)=""/68, &(0x7f0000002b80)=0x44) socket(0x26, 0x5, 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='-\t\x00'], 0xd) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000002bc0)) 09:19:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 142.277341][T19855] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 142.285334][T19855] ENOMEM in journal_alloc_journal_head, retrying. [ 142.293040][T19852] loop3: p2 < > p4 [ 142.303133][T19852] loop3: p4 size 2097152 extends beyond EOD, truncated [ 142.319307][T19857] loop0: detected capacity change from 0 to 1 09:19:12 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 15) [ 142.338015][T19860] tmpfs: Unknown parameter 'hash' 09:19:13 executing program 4: unshare(0x40040400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x90601, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 142.368465][T19865] loop1: detected capacity change from 0 to 264192 [ 142.378938][T19857] loop0: p2 < > p4 [ 142.382795][T19857] loop0: p2 size 2 extends beyond EOD, truncated [ 142.389980][T19860] tmpfs: Unknown parameter 'hash' [ 142.394762][T19857] loop0: p4 size 2097152 extends beyond EOD, truncated [ 142.402697][T19870] loop3: detected capacity change from 0 to 264192 [ 142.411376][T19873] FAULT_INJECTION: forcing a failure. [ 142.411376][T19873] name failslab, interval 1, probability 0, space 0, times 0 [ 142.424013][T19873] CPU: 0 PID: 19873 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 142.432772][T19873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.442901][T19873] Call Trace: [ 142.446171][T19873] dump_stack_lvl+0xd6/0x122 [ 142.450760][T19873] dump_stack+0x11/0x1b [ 142.454984][T19873] should_fail+0x23c/0x250 [ 142.459394][T19873] ? __se_sys_mount+0x4e/0x2f0 [ 142.464164][T19873] __should_failslab+0x81/0x90 [ 142.469057][T19873] should_failslab+0x5/0x20 [ 142.473567][T19873] __kmalloc_track_caller+0x6d/0x350 [ 142.478877][T19873] ? do_mkdirat+0x293/0x2c0 [ 142.483468][T19873] ? strnlen_user+0x137/0x1c0 [ 142.488227][T19873] strndup_user+0x73/0x120 [ 142.492647][T19873] __se_sys_mount+0x4e/0x2f0 [ 142.497286][T19873] ? do_mkdirat+0x293/0x2c0 [ 142.501842][T19873] __x64_sys_mount+0x63/0x70 [ 142.506458][T19873] do_syscall_64+0x44/0xa0 [ 142.510972][T19873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.516874][T19873] RIP: 0033:0x7f8ca5468f6a [ 142.521284][T19873] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.540891][T19873] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 142.549362][T19873] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 142.557338][T19873] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 142.565329][T19873] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 142.573356][T19873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 142.581353][T19873] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 142.590492][T19865] loop1: p2 < > p4 [ 142.598859][T19870] loop3: p2 < > p4 [ 142.603252][T19870] loop3: p4 size 2097152 extends beyond EOD, truncated [ 142.603430][T19865] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:13 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:13 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605040206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 142.632006][T19980] tmpfs: Unknown parameter 'hash' 09:19:13 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x900000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 16) [ 142.684328][T19985] loop3: detected capacity change from 0 to 264192 [ 142.698676][T19982] loop1: detected capacity change from 0 to 264192 [ 142.707267][T19986] loop0: detected capacity change from 0 to 1 [ 142.727860][T19988] tmpfs: Unknown parameter 'hash' [ 142.741875][T19990] FAULT_INJECTION: forcing a failure. [ 142.741875][T19990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.754961][T19990] CPU: 1 PID: 19990 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 142.763727][T19990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.773793][T19990] Call Trace: [ 142.777075][T19990] dump_stack_lvl+0xd6/0x122 [ 142.781679][T19990] dump_stack+0x11/0x1b [ 142.785872][T19990] should_fail+0x23c/0x250 [ 142.788752][T19985] loop3: p2 < > p4 [ 142.790358][T19990] should_fail_usercopy+0x16/0x20 [ 142.794517][T19982] loop1: p2 < > p4 [ 142.799175][T19990] _copy_from_user+0x1c/0xd0 [ 142.799201][T19990] strndup_user+0xb0/0x120 [ 142.803442][T19985] loop3: p4 size 2097152 extends beyond EOD, [ 142.807579][T19990] __se_sys_mount+0x4e/0x2f0 [ 142.812016][T19985] truncated [ 142.812553][T19982] loop1: p4 size 2097152 extends beyond EOD, [ 142.818497][T19990] __x64_sys_mount+0x63/0x70 [ 142.823094][T19982] truncated [ 142.839929][T19990] do_syscall_64+0x44/0xa0 [ 142.844552][T19990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.850454][T19990] RIP: 0033:0x7f8ca5468f6a [ 142.854883][T19990] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.874528][T19990] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 142.883024][T19990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a 09:19:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 142.891003][T19990] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 142.898973][T19990] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 142.906946][T19990] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 142.914917][T19990] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 142.923734][T19986] loop0: p2 < > p4 [ 142.927685][T19986] loop0: p2 size 2 extends beyond EOD, truncated 09:19:13 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 17) 09:19:13 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x900000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 142.962752][T19992] tmpfs: Unknown parameter 'hash' [ 142.969309][T19986] loop0: p4 size 2097152 extends beyond EOD, truncated [ 142.996052][T19994] loop3: detected capacity change from 0 to 264192 [ 143.003384][T19992] tmpfs: Unknown parameter 'hash' [ 143.012134][ T380] loop0: p2 < > p4 [ 143.016199][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 143.018231][T19998] loop1: detected capacity change from 0 to 264192 [ 143.030251][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 143.030484][T19996] FAULT_INJECTION: forcing a failure. [ 143.030484][T19996] name failslab, interval 1, probability 0, space 0, times 0 [ 143.049849][T19996] CPU: 0 PID: 19996 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 143.058611][T19996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.068686][T19996] Call Trace: [ 143.072024][T19996] dump_stack_lvl+0xd6/0x122 [ 143.076621][T19996] dump_stack+0x11/0x1b [ 143.080881][T19996] should_fail+0x23c/0x250 [ 143.085302][T19996] __should_failslab+0x81/0x90 [ 143.090071][T19996] ? __se_sys_mount+0xf7/0x2f0 [ 143.094923][T19996] should_failslab+0x5/0x20 [ 143.099464][T19996] kmem_cache_alloc_trace+0x52/0x320 [ 143.104810][T19996] ? _copy_from_user+0x94/0xd0 [ 143.109616][T19996] __se_sys_mount+0xf7/0x2f0 [ 143.114252][T19996] __x64_sys_mount+0x63/0x70 [ 143.118980][T19996] do_syscall_64+0x44/0xa0 [ 143.123421][T19996] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.129318][T19996] RIP: 0033:0x7f8ca5468f6a [ 143.133766][T19996] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.153387][T19996] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 143.161851][T19996] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 143.169824][T19996] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 143.177807][T19996] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 143.185782][T19996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 143.193768][T19996] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 143.218601][T19994] loop3: p2 < > p4 [ 143.225123][T19994] loop3: p4 size 2097152 extends beyond EOD, truncated [ 143.240155][T19998] loop1: p2 < > p4 09:19:13 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605070206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 18) [ 143.263187][T19998] loop1: p4 size 2097152 extends beyond EOD, truncated [ 143.277043][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 143.277095][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 143.306334][T20000] tmpfs: Unknown parameter 'hash' 09:19:13 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xb00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 143.323962][T20002] loop0: detected capacity change from 0 to 1 [ 143.332472][T20004] FAULT_INJECTION: forcing a failure. [ 143.332472][T20004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.345540][T20004] CPU: 1 PID: 20004 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 143.352052][T20006] loop3: detected capacity change from 0 to 264192 [ 143.354418][T20004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.354430][T20004] Call Trace: 09:19:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 143.354437][T20004] dump_stack_lvl+0xd6/0x122 [ 143.354519][T20004] dump_stack+0x11/0x1b [ 143.383052][T20004] should_fail+0x23c/0x250 [ 143.387658][T20004] should_fail_usercopy+0x16/0x20 [ 143.392684][T20004] _copy_from_user+0x1c/0xd0 [ 143.397382][T20004] __se_sys_mount+0x119/0x2f0 [ 143.402064][T20004] __x64_sys_mount+0x63/0x70 [ 143.406730][T20004] do_syscall_64+0x44/0xa0 [ 143.411324][T20004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.417293][T20004] RIP: 0033:0x7f8ca5468f6a [ 143.421705][T20004] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.441314][T20004] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 143.449738][T20004] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 143.458270][T20004] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 143.466242][T20004] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 143.474215][T20004] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 143.482191][T20004] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 143.499436][T20002] loop0: p2 < > p4 [ 143.503588][T20006] loop3: p2 < > p4 [ 143.507771][T20002] loop0: p2 size 2 extends beyond EOD, truncated [ 143.517111][T20006] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:14 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 143.517695][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 143.534922][T20002] loop0: p4 size 2097152 extends beyond EOD, truncated [ 143.563575][T20112] loop1: detected capacity change from 0 to 264192 09:19:14 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 19) 09:19:14 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605080206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 143.573475][T20110] tmpfs: Unknown parameter 'hash' [ 143.595207][T20114] loop3: detected capacity change from 0 to 264192 [ 143.602336][T20110] tmpfs: Unknown parameter 'hash' [ 143.619597][T20116] FAULT_INJECTION: forcing a failure. 09:19:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 143.619597][T20116] name failslab, interval 1, probability 0, space 0, times 0 [ 143.629600][T20118] loop0: detected capacity change from 0 to 1 [ 143.632229][T20116] CPU: 1 PID: 20116 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 143.646993][T20116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.657038][T20116] Call Trace: [ 143.660438][T20116] dump_stack_lvl+0xd6/0x122 [ 143.665173][T20116] dump_stack+0x11/0x1b [ 143.669371][T20116] should_fail+0x23c/0x250 [ 143.673787][T20116] ? getname_flags+0x84/0x3f0 [ 143.678471][T20116] __should_failslab+0x81/0x90 [ 143.683234][T20116] should_failslab+0x5/0x20 [ 143.687758][T20116] kmem_cache_alloc+0x4f/0x300 [ 143.692572][T20116] ? should_fail+0xd6/0x250 [ 143.697130][T20116] getname_flags+0x84/0x3f0 [ 143.701640][T20116] ? should_fail+0xd6/0x250 [ 143.706222][T20116] user_path_at_empty+0x28/0x110 [ 143.711279][T20116] __se_sys_mount+0x217/0x2f0 [ 143.715962][T20116] __x64_sys_mount+0x63/0x70 [ 143.718806][ T380] loop1: p2 < > p4 [ 143.720695][T20116] do_syscall_64+0x44/0xa0 [ 143.725087][ T380] loop1: p4 size 2097152 extends beyond EOD, [ 143.728903][T20116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.728931][T20116] RIP: 0033:0x7f8ca5468f6a [ 143.735039][ T380] truncated [ 143.748450][T20116] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.768149][T20116] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 143.776555][T20116] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 143.784589][T20116] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 143.792584][T20116] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 143.800558][T20116] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 143.808595][T20116] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 143.819238][T20120] tmpfs: Unknown parameter 'hash' 09:19:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 20) [ 143.824771][T20114] loop3: p2 < > p4 [ 143.828850][T20112] loop1: p2 < > p4 [ 143.829134][T20114] loop3: p4 size 2097152 extends beyond EOD, truncated [ 143.839816][T20118] loop0: p2 < > p4 [ 143.843795][T20118] loop0: p2 size 2 extends beyond EOD, truncated [ 143.850444][T20120] tmpfs: Unknown parameter 'hash' [ 143.850579][T20112] loop1: p4 size 2097152 extends beyond EOD, truncated [ 143.867127][T20118] loop0: p4 size 2097152 extends beyond EOD, truncated [ 143.885882][T20122] FAULT_INJECTION: forcing a failure. [ 143.885882][T20122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.898968][T20122] CPU: 1 PID: 20122 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 143.907729][T20122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.917789][T20122] Call Trace: [ 143.921070][T20122] dump_stack_lvl+0xd6/0x122 [ 143.925688][T20122] dump_stack+0x11/0x1b [ 143.929847][T20122] should_fail+0x23c/0x250 09:19:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 143.934266][T20122] should_fail_usercopy+0x16/0x20 [ 143.939326][T20122] strncpy_from_user+0x21/0x250 [ 143.944188][T20122] getname_flags+0xb8/0x3f0 [ 143.948699][T20122] ? should_fail+0xd6/0x250 [ 143.953319][T20122] user_path_at_empty+0x28/0x110 [ 143.958297][T20122] __se_sys_mount+0x217/0x2f0 [ 143.962980][T20122] __x64_sys_mount+0x63/0x70 [ 143.967594][T20122] do_syscall_64+0x44/0xa0 [ 143.972105][T20122] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.978054][T20122] RIP: 0033:0x7f8ca5468f6a [ 143.982523][T20122] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.002157][T20122] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 144.010592][T20122] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 144.018624][T20122] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 144.026598][T20122] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 09:19:14 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xd00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 144.034609][T20122] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 144.042582][T20122] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 144.062722][T20125] tmpfs: Unknown parameter 'hash' 09:19:14 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605090206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 21) 09:19:14 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xb00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 144.083345][T20127] loop3: detected capacity change from 0 to 264192 [ 144.094153][T20125] tmpfs: Unknown parameter 'hash' [ 144.110776][T20129] loop0: detected capacity change from 0 to 1 [ 144.122690][T20131] FAULT_INJECTION: forcing a failure. [ 144.122690][T20131] name failslab, interval 1, probability 0, space 0, times 0 09:19:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 144.132930][T20133] loop1: detected capacity change from 0 to 264192 [ 144.135354][T20131] CPU: 1 PID: 20131 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 144.150542][T20131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.160670][T20131] Call Trace: [ 144.163956][T20131] dump_stack_lvl+0xd6/0x122 [ 144.168555][T20131] dump_stack+0x11/0x1b [ 144.172798][T20131] should_fail+0x23c/0x250 [ 144.177234][T20131] __should_failslab+0x81/0x90 [ 144.182029][T20131] ? alloc_fs_context+0x46/0x500 [ 144.187023][T20131] should_failslab+0x5/0x20 [ 144.191553][T20131] kmem_cache_alloc_trace+0x52/0x320 [ 144.196918][T20131] alloc_fs_context+0x46/0x500 [ 144.201764][T20131] ? strncmp+0x34/0x70 [ 144.205867][T20131] fs_context_for_mount+0x1d/0x20 [ 144.211073][T20131] path_mount+0xe0d/0x1d20 [ 144.215523][T20131] __se_sys_mount+0x24b/0x2f0 [ 144.220249][T20131] __x64_sys_mount+0x63/0x70 [ 144.224855][T20131] do_syscall_64+0x44/0xa0 [ 144.229299][T20131] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.235204][T20131] RIP: 0033:0x7f8ca5468f6a [ 144.239628][T20131] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.259233][T20131] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 144.267656][T20131] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 144.275635][T20131] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 144.283636][T20131] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 144.291609][T20131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 144.299577][T20131] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 144.308962][T20127] loop3: p2 < > p4 [ 144.313560][T20127] loop3: p4 size 2097152 extends beyond EOD, truncated [ 144.330308][ T380] loop0: p2 < > p4 [ 144.334460][T20133] loop1: p2 < > p4 09:19:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:15 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 144.338602][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 144.345988][T20133] loop1: p4 size 2097152 extends beyond EOD, truncated [ 144.362651][T20237] tmpfs: Unknown parameter 'hash' [ 144.370018][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 22) [ 144.391516][T20237] tmpfs: Unknown parameter 'hash' [ 144.399821][T20239] loop3: detected capacity change from 0 to 264192 [ 144.406661][T20129] loop0: p2 < > p4 [ 144.418153][T20241] FAULT_INJECTION: forcing a failure. [ 144.418153][T20241] name failslab, interval 1, probability 0, space 0, times 0 [ 144.418452][T20129] loop0: p2 size 2 extends beyond EOD, truncated [ 144.430806][T20241] CPU: 1 PID: 20241 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 144.445850][T20241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.449532][T20129] loop0: p4 size 2097152 extends beyond EOD, [ 144.455904][T20241] Call Trace: [ 144.455912][T20241] dump_stack_lvl+0xd6/0x122 [ 144.461994][T20129] truncated [ 144.465233][T20241] dump_stack+0x11/0x1b [ 144.477244][T20241] should_fail+0x23c/0x250 [ 144.481664][T20241] __should_failslab+0x81/0x90 [ 144.486427][T20241] ? shmem_init_fs_context+0x34/0xf0 [ 144.491711][T20241] should_failslab+0x5/0x20 [ 144.496217][T20241] kmem_cache_alloc_trace+0x52/0x320 [ 144.501660][T20241] shmem_init_fs_context+0x34/0xf0 [ 144.506944][T20241] alloc_fs_context+0x419/0x500 [ 144.511796][T20241] fs_context_for_mount+0x1d/0x20 [ 144.516830][T20241] path_mount+0xe0d/0x1d20 [ 144.521257][T20241] __se_sys_mount+0x24b/0x2f0 [ 144.525936][T20241] __x64_sys_mount+0x63/0x70 [ 144.530651][T20241] do_syscall_64+0x44/0xa0 [ 144.535073][T20241] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.541022][T20241] RIP: 0033:0x7f8ca5468f6a [ 144.545425][T20241] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.565087][T20241] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 144.573509][T20241] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 144.581542][T20241] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:15 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 144.589494][T20241] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 144.597495][T20241] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 144.605451][T20241] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 23) 09:19:15 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050a0206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 144.638886][ T4660] loop3: p2 < > p4 [ 144.647946][T20245] loop1: detected capacity change from 0 to 264192 [ 144.655502][T20243] tmpfs: Unknown parameter 'hash' [ 144.660778][ T4660] loop3: p4 size 2097152 extends beyond EOD, truncated [ 144.683286][T20243] tmpfs: Unknown parameter 'hash' [ 144.691053][T20239] loop3: p2 < > p4 [ 144.708567][T20245] loop1: p2 < > p4 [ 144.712816][T20239] loop3: p4 size 2097152 extends beyond EOD, truncated [ 144.719966][T20245] loop1: p4 size 2097152 extends beyond EOD, truncated [ 144.732983][T20247] FAULT_INJECTION: forcing a failure. [ 144.732983][T20247] name failslab, interval 1, probability 0, space 0, times 0 [ 144.745631][T20247] CPU: 0 PID: 20247 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 144.754521][T20247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.764579][T20247] Call Trace: [ 144.767947][T20247] dump_stack_lvl+0xd6/0x122 [ 144.772550][T20247] dump_stack+0x11/0x1b [ 144.776706][T20247] should_fail+0x23c/0x250 [ 144.781121][T20247] __should_failslab+0x81/0x90 [ 144.785897][T20247] ? alloc_super+0x3a/0x520 [ 144.790395][T20247] should_failslab+0x5/0x20 [ 144.794965][T20247] kmem_cache_alloc_trace+0x52/0x320 [ 144.800297][T20247] alloc_super+0x3a/0x520 [ 144.804666][T20247] sget_fc+0x1cf/0x4e0 [ 144.808741][T20247] ? kill_litter_super+0x60/0x60 [ 144.813808][T20247] ? shmem_reconfigure+0x4c0/0x4c0 [ 144.818919][T20247] get_tree_nodev+0x24/0x100 [ 144.823514][T20247] shmem_get_tree+0x18/0x20 [ 144.828062][T20247] vfs_get_tree+0x4a/0x1a0 [ 144.832554][T20247] path_mount+0x11ec/0x1d20 [ 144.837104][T20247] __se_sys_mount+0x24b/0x2f0 [ 144.841787][T20247] __x64_sys_mount+0x63/0x70 [ 144.846401][T20247] do_syscall_64+0x44/0xa0 [ 144.850825][T20247] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.856799][T20247] RIP: 0033:0x7f8ca5468f6a [ 144.861215][T20247] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.880920][T20247] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:19:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 144.889395][T20247] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 144.897420][T20247] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 144.905395][T20247] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 144.913410][T20247] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 144.921391][T20247] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 144.933474][T20249] loop0: detected capacity change from 0 to 1 09:19:15 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xd00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 24) [ 144.959822][T20251] tmpfs: Unknown parameter 'hash' [ 144.979368][T20249] loop0: p2 < > p4 [ 144.989946][T20249] loop0: p2 size 2 extends beyond EOD, truncated [ 144.999142][T20251] tmpfs: Unknown parameter 'hash' 09:19:15 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xf00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 145.016603][T20249] loop0: p4 size 2097152 extends beyond EOD, truncated [ 145.037731][T20253] loop3: detected capacity change from 0 to 264192 [ 145.050983][T20255] loop1: detected capacity change from 0 to 264192 [ 145.060202][T20257] FAULT_INJECTION: forcing a failure. [ 145.060202][T20257] name failslab, interval 1, probability 0, space 0, times 0 [ 145.072931][T20257] CPU: 1 PID: 20257 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 145.081697][T20257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.091793][T20257] Call Trace: [ 145.095077][T20257] dump_stack_lvl+0xd6/0x122 [ 145.099677][T20257] dump_stack+0x11/0x1b [ 145.103840][T20257] should_fail+0x23c/0x250 [ 145.108301][T20257] ? kzalloc+0x1d/0x30 [ 145.112370][T20257] __should_failslab+0x81/0x90 [ 145.117139][T20257] should_failslab+0x5/0x20 [ 145.121663][T20257] __kmalloc+0x6f/0x350 [ 145.125947][T20257] kzalloc+0x1d/0x30 [ 145.129848][T20257] security_sb_alloc+0x3c/0x180 [ 145.134703][T20257] alloc_super+0x10b/0x520 [ 145.139139][T20257] sget_fc+0x1cf/0x4e0 [ 145.143222][T20257] ? kill_litter_super+0x60/0x60 [ 145.148169][T20257] ? shmem_reconfigure+0x4c0/0x4c0 [ 145.153290][T20257] get_tree_nodev+0x24/0x100 [ 145.158007][T20257] shmem_get_tree+0x18/0x20 [ 145.162514][T20257] vfs_get_tree+0x4a/0x1a0 [ 145.166940][T20257] path_mount+0x11ec/0x1d20 [ 145.171459][T20257] __se_sys_mount+0x24b/0x2f0 [ 145.176211][T20257] __x64_sys_mount+0x63/0x70 [ 145.180897][T20257] do_syscall_64+0x44/0xa0 [ 145.185393][T20257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.191302][T20257] RIP: 0033:0x7f8ca5468f6a [ 145.195714][T20257] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.215326][T20257] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 145.223873][T20257] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 145.228723][T20253] loop3: p2 < > p4 [ 145.231849][T20257] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 145.240366][T20253] loop3: p4 size 2097152 extends beyond EOD, [ 145.243612][T20257] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 145.243627][T20257] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 09:19:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 25) 09:19:15 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605150206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 145.243639][T20257] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 145.273912][T20253] truncated [ 145.277699][T20259] tmpfs: Unknown parameter 'hash' [ 145.308933][T20259] tmpfs: Unknown parameter 'hash' [ 145.314997][T20261] FAULT_INJECTION: forcing a failure. [ 145.314997][T20261] name failslab, interval 1, probability 0, space 0, times 0 [ 145.327637][T20261] CPU: 1 PID: 20261 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 145.336404][T20261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.346685][T20261] Call Trace: [ 145.349963][T20261] dump_stack_lvl+0xd6/0x122 [ 145.354555][T20261] dump_stack+0x11/0x1b [ 145.358715][T20261] should_fail+0x23c/0x250 [ 145.363133][T20261] ? __list_lru_init+0x70/0x680 [ 145.367996][T20261] __should_failslab+0x81/0x90 [ 145.372774][T20261] should_failslab+0x5/0x20 [ 145.377292][T20261] __kmalloc+0x6f/0x350 [ 145.381449][T20261] ? prealloc_memcg_shrinker+0x444/0x460 [ 145.387079][T20261] __list_lru_init+0x70/0x680 [ 145.391813][T20261] alloc_super+0x490/0x520 [ 145.396231][T20261] sget_fc+0x1cf/0x4e0 [ 145.400419][T20261] ? kill_litter_super+0x60/0x60 [ 145.405434][T20261] ? shmem_reconfigure+0x4c0/0x4c0 [ 145.410583][T20261] get_tree_nodev+0x24/0x100 [ 145.415275][T20261] shmem_get_tree+0x18/0x20 [ 145.419817][T20261] vfs_get_tree+0x4a/0x1a0 [ 145.424342][T20261] path_mount+0x11ec/0x1d20 [ 145.428923][T20261] __se_sys_mount+0x24b/0x2f0 [ 145.433606][T20261] __x64_sys_mount+0x63/0x70 [ 145.438284][T20261] do_syscall_64+0x44/0xa0 [ 145.442766][T20261] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.448720][T20261] RIP: 0033:0x7f8ca5468f6a [ 145.453131][T20261] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.472768][T20261] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 145.481213][T20261] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 145.489191][T20261] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 145.497164][T20261] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 09:19:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 145.505139][T20261] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 145.513157][T20261] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 145.521489][T20255] loop1: p2 < > p4 [ 145.525811][T20255] loop1: p4 size 2097152 extends beyond EOD, truncated [ 145.537261][T20263] loop0: detected capacity change from 0 to 1 [ 145.549769][T20265] tmpfs: Unknown parameter 'hash' 09:19:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:16 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 145.568967][T20263] loop0: p2 < > p4 [ 145.572898][T20263] loop0: p2 size 2 extends beyond EOD, truncated [ 145.585192][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 145.599039][T20263] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 26) 09:19:16 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 145.619132][T20267] tmpfs: Unknown parameter 'hash' [ 145.626962][T20269] loop3: detected capacity change from 0 to 264192 [ 145.644973][T20273] FAULT_INJECTION: forcing a failure. [ 145.644973][T20273] name failslab, interval 1, probability 0, space 0, times 0 [ 145.646103][T20272] loop1: detected capacity change from 0 to 264192 [ 145.657638][T20273] CPU: 0 PID: 20273 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 145.672854][T20273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.682908][T20273] Call Trace: [ 145.686184][T20273] dump_stack_lvl+0xd6/0x122 [ 145.690786][T20273] dump_stack+0x11/0x1b [ 145.694945][T20273] should_fail+0x23c/0x250 [ 145.699378][T20273] __should_failslab+0x81/0x90 [ 145.704234][T20273] should_failslab+0x5/0x20 [ 145.708836][T20273] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 145.714557][T20273] ? __kmalloc_node+0x30/0x40 [ 145.719236][T20273] __kmalloc_node+0x30/0x40 [ 145.723762][T20273] kvmalloc_node+0x81/0x110 [ 145.728270][T20273] __list_lru_init+0x2d7/0x680 [ 145.733046][T20273] alloc_super+0x490/0x520 [ 145.737463][T20273] sget_fc+0x1cf/0x4e0 [ 145.741657][T20273] ? kill_litter_super+0x60/0x60 [ 145.746596][T20273] ? shmem_reconfigure+0x4c0/0x4c0 [ 145.751712][T20273] get_tree_nodev+0x24/0x100 [ 145.756333][T20273] shmem_get_tree+0x18/0x20 [ 145.760845][T20273] vfs_get_tree+0x4a/0x1a0 [ 145.765276][T20273] path_mount+0x11ec/0x1d20 [ 145.769786][T20273] __se_sys_mount+0x24b/0x2f0 [ 145.774475][T20273] __x64_sys_mount+0x63/0x70 [ 145.779210][T20273] do_syscall_64+0x44/0xa0 [ 145.783737][T20273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.789711][T20273] RIP: 0033:0x7f8ca5468f6a [ 145.794181][T20273] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.813903][T20273] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 145.822321][T20273] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 145.830304][T20273] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 145.838352][T20273] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 145.846331][T20273] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 145.854308][T20273] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:16 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605280206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 145.902962][T20269] loop3: p2 < > p4 [ 145.907047][ T380] loop1: p2 < > p4 [ 145.916810][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 145.926313][T20269] loop3: p4 size 2097152 extends beyond EOD, truncated [ 145.937632][T20277] tmpfs: Unknown parameter 'hash' [ 145.942190][T20275] loop0: detected capacity change from 0 to 1 09:19:16 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1100000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 145.954277][T20272] loop1: p2 < > p4 [ 145.958723][T20272] loop1: p4 size 2097152 extends beyond EOD, truncated [ 145.969173][T20277] tmpfs: Unknown parameter 'hash' 09:19:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:16 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xf00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 146.009346][T20275] loop0: p2 < > p4 [ 146.019009][T20275] loop0: p2 size 2 extends beyond EOD, truncated [ 146.022112][T20279] loop3: detected capacity change from 0 to 264192 [ 146.041252][T20281] loop1: detected capacity change from 0 to 264192 09:19:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 27) [ 146.059306][T20275] loop0: p4 size 2097152 extends beyond EOD, truncated [ 146.071903][T20283] tmpfs: Unknown parameter 'hash' [ 146.072194][ T380] loop0: p2 < > p4 [ 146.081520][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 146.098522][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 146.106460][T20285] FAULT_INJECTION: forcing a failure. [ 146.106460][T20285] name failslab, interval 1, probability 0, space 0, times 0 [ 146.119109][T20285] CPU: 1 PID: 20285 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 146.127870][T20285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.136403][T20279] loop3: p2 < > p4 [ 146.137923][T20285] Call Trace: [ 146.137932][T20285] dump_stack_lvl+0xd6/0x122 [ 146.142278][T20279] loop3: p4 size 2097152 extends beyond EOD, [ 146.145003][T20285] dump_stack+0x11/0x1b [ 146.149631][T20279] truncated [ 146.155649][T20285] should_fail+0x23c/0x250 [ 146.167314][T20285] __should_failslab+0x81/0x90 [ 146.172140][T20285] ? __list_lru_init+0x332/0x680 [ 146.177161][T20285] should_failslab+0x5/0x20 [ 146.181685][T20285] kmem_cache_alloc_trace+0x52/0x320 [ 146.186969][T20285] ? __kmalloc_node+0x30/0x40 [ 146.191653][T20285] __list_lru_init+0x332/0x680 [ 146.196437][T20285] alloc_super+0x490/0x520 [ 146.200839][T20285] sget_fc+0x1cf/0x4e0 [ 146.204931][T20285] ? kill_litter_super+0x60/0x60 [ 146.209895][T20285] ? shmem_reconfigure+0x4c0/0x4c0 [ 146.215000][T20285] get_tree_nodev+0x24/0x100 [ 146.219596][T20285] shmem_get_tree+0x18/0x20 [ 146.224094][T20285] vfs_get_tree+0x4a/0x1a0 [ 146.228580][T20285] path_mount+0x11ec/0x1d20 [ 146.233143][T20285] __se_sys_mount+0x24b/0x2f0 [ 146.237842][T20285] __x64_sys_mount+0x63/0x70 [ 146.242545][T20285] do_syscall_64+0x44/0xa0 [ 146.247088][T20285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.252971][T20285] RIP: 0033:0x7f8ca5468f6a [ 146.257369][T20285] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.277023][T20285] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 146.285427][T20285] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 146.293481][T20285] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 146.301524][T20285] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 09:19:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 146.309557][T20285] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 146.317580][T20285] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 146.329355][T20281] loop1: p2 < > p4 [ 146.340823][T20281] loop1: p4 size 2097152 extends beyond EOD, truncated [ 146.350969][ T380] loop3: p2 < > p4 09:19:17 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605640206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:17 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0xfffffffffffffffd) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000580)={0x4a, [{0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}], 0xfa, "bbeda0d9465832"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001580)={0x6, [{r73, r165}, {r48, r120}, {r107, r18}, {r121}, {r208, r282}, {r319, r259}, {r323, r186}, {r103, r177}, {r56, r109}, {r325}, {r161, r39}, {r33, r243}, {r65, r221}, {r184, r298}, {r5, r140}, {r82, r54}, {r65, r292}, {0x0, r309}, {r9, r190}, {r31, r292}, {r153, r71}, {r82, r81}, {r254, r247}, {r146, r46}, {r128, r167}, {0x0, r70}, {r148, r23}, {r175, r112}, {r180, r223}, {r27, r22}, {r10, r217}, {r253, r265}, {r85, r285}, {r175, r145}, {r281, r54}, {r2, r202}, {r336, r114}, {r303, r167}, {r29, r64}, {r55, r305}, {r310, r36}, {r125, r245}, {r113, r257}, {r252, r106}, {r136, r109}, {0x0, r149}, {r261}, {r47, r22}, {r196, r6}, {r280, r241}, {r276, r223}, {r295, r142}, {r218, r43}, {0x0, r307}, {r205, r251}, {r238, r133}, {r119, r124}, {r29, r34}, {r13}, {r123, r68}, {r261, r237}, {r321, r300}, {r176, r300}, {r41, r77}, {r10, r259}, {r139, r234}, {r338, r298}, {r98, r298}, {r256, r102}, {r130, r292}, {r66, r126}, {r276}, {r332, r290}, {r269, r204}, {r38, r68}, {r218}, {r244, r264}, {r191, r339}, {r258}, {r85, r120}, {0x0, r226}, {r239, r337}, {r291, r324}, {r52, r100}, {0x0, r49}, {r17, r206}, {r231, r266}, {r236, r192}, {r48, r245}, {r271, r75}, {r50, r159}, {r26, r277}, {r246, r149}, {r115, r210}, {r284, r193}, {r233, r272}, {r222, r240}, {r105, 0x0}, {r231, r293}, {r5, r51}, {r60, r199}, {r306, r302}, {r138, r296}, {r117, r59}, {r148, r84}, {r5, r129}, {0x0, r89}, {r242, r260}, {r119, r235}, {r94, r318}, {r45, r54}, {r203, r62}, {r108, r241}, {0x0, r307}, {r172, r311}, {r76, r159}, {r200, r181}, {r7, r241}, {r4, r183}, {r308, r288}, {r90, r219}, {r117, r21}, {r329, r93}, {r180, r219}, {r128, r320}, {r250, r228}, {r101, r30}, {r276, r43}, {r274, r120}, {r233, r181}, {r111, r95}, {r187, r286}, {0x0, r307}, {r248, r227}, {r92, 0x0}, {0x0, r86}, {r200, r88}, {r19, r227}, {0x0, r279}, {r236, r104}, {r168, r164}, {r328, r77}, {r151, r169}, {r24, r12}, {r220, r320}, {r284, r262}, {0x0, r331}, {r48, r268}, {r101, r142}, {r182, r215}, {r232, r70}, {r85, 0x0}, {r306, r174}, {r166, r177}, {0x0, r322}, {r78, r44}, {r141, r154}, {r48}, {r178, r74}, {r184, r28}, {r170, r183}, {r246, r307}, {r278}, {r171, r197}, {r194}, {r61, 0x0}, {r297, r285}, {r175, r116}, {0x0, r177}, {r127, r135}, {r67, r241}, {0x0, r122}, {r330, r37}, {r244, r25}, {r27}, {r2, r185}, {r27, r8}, {r14, r129}, {r155, r96}, {r295, r84}, {r214, r154}, {r117}, {r216, r39}, {r115, r62}, {r294, r3}, {r132, r34}, {r87}, {0x0, r156}, {r63, r309}, {r58, r211}, {r231, r324}, {r134, r118}, {r250}, {r229, r186}, {0x0, r288}, {r218, r135}, {r209, r79}, {r249, r57}, {r200, r3}, {r244}, {r274}, {r301, r81}, {r299, r62}, {r55}, {r249, r152}, {r80, r207}, {0x0, r327}, {r128, r207}, {r325}, {r121, r282}, {r280, r316}, {r212, r20}, {r220, r34}, {r5, r223}, {r67, r79}, {r238, r114}, {r83}, {0x0, r124}, {r225, r89}, {r163, r188}, {r287, r169}, {r110, r262}, {r52, r264}, {r249, r51}, {r326, r235}, {r334, r333}, {r168, r255}, {r313}, {r178, r260}, {r29, r147}, {r224, r91}, {r246, r8}, {r9, r230}, {r101, r93}, {r97, r264}, {r321, r302}, {0x0, r240}, {r40, r268}, {r158, r16}, {r105, r160}, {r334, r275}, {r15}, {r294, r337}, {r278, r277}, {r2, r32}, {r287, r154}, {r42, r314}, {r157, r335}, {r33, r265}, {r141, r174}, {r330, r88}, {r201, r6}, {r13, r213}, {0x0, r142}, {r99, r188}], 0x81, "00e644b8e12d99"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004ec00)={0x8001, [{}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {r45}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {r391}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {r267, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "8c73253a626560"}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) r465 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000480)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r465, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r417}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, r439}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r428}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r514 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d480)={0x9, [{r344, r413}, {}, {0x0, r500}, {}, {r393, r443}, {r432, r501}, {r143, r302}, {0x0, r365}, {r424, r74}, {r340}, {0x0, r371}, {0x0, r373}, {}, {r397}, {}, {0x0, r390}, {0x0, r395}, {r225}, {r380, r363}, {r348, r467}, {}, {r511}, {r53}, {r416, r374}, {r198}, {r361}, {r382}, {0x0, r367}, {r477, r282}, {r402, r460}, {r403}, {0x0, r425}, {r50}, {r144, r362}, {}, {r431, r513}, {}, {0x0, r468}, {r342}, {}, {r382}, {r350}, {0x0, r509}, {0x0, r427}, {0x0, r470}, {0x0, r11}, {0x0, r480}, {r341}, {0x0, r46}, {r487, r177}, {}, {0x0, r72}, {0x0, r475}, {}, {}, {}, {}, {r263, r438}, {0x0, r150}, {r353}, {r401}, {r35}, {r69}, {r463, r464}, {0x0, r137}, {r499, r464}, {0x0, r159}, {r471, r234}, {}, {r512}, {r456, r490}, {}, {r441, r496}, {r430}, {r394, r434}, {r7}, {r389, r300}, {r418}, {0x0, r285}, {0x0, r377}, {0x0, r492}, {}, {r194}, {r342, r204}, {r414}, {r410, r386}, {r483, r451}, {}, {}, {r349, r481}, {r457, r179}, {r466}, {0x0, r100}, {0x0, r420}, {}, {}, {r504}, {0x0, r472}, {0x0, r199}, {}, {}, {}, {r497, r173}, {r283}, {r325, r442}, {r347}, {0x0, r378}, {}, {0x0, r506}, {}, {r158}, {r368, r195}, {r352}, {r189, r190}, {0x0, r488}, {r512}, {r495}, {r489, r298}, {}, {r357, r437}, {0x0, r502}, {}, {r119}, {}, {}, {}, {}, {r270}, {r436, r62}, {}, {}, {}, {0x0, r327}, {r454, r383}, {r351}, {}, {r435, r202}, {r422}, {}, {0x0, r290}, {r452}, {r384, r458}, {0x0, r404}, {0x0, r455}, {r484}, {0x0, r473}, {r508, r491}, {r370, r376}, {}, {0x0, r459}, {0x0, r476}, {0x0, r426}, {}, {}, {0x0, r412}, {0x0, r415}, {r498}, {}, {r381}, {0x0, r364}, {}, {r346, r505}, {r317}, {r450}, {r360}, {}, {}, {r445}, {r387}, {0x0, r366}, {r400, r447}, {r507, r462}, {0x0, r304}, {}, {}, {r453}, {r486, r485}, {}, {}, {r315}, {r482, r433}, {r358}, {r369}, {}, {}, {r355}, {}, {}, {r189, r356}, {0x0, r345}, {}, {r419, r449}, {0x0, r408}, {}, {r139, r398}, {}, {r372, r411}, {r423}, {}, {}, {0x0, r406}, {}, {r233}, {r448, r407}, {}, {r168, r118}, {}, {0x0, r289}, {r375, r447}, {0x0, r135}, {r233}, {0x0, r388}, {}, {r26, r494}, {}, {r444}, {}, {r354}, {r469, r199}, {0x0, r440}, {r42}, {r422}, {r510, r474}, {r254}, {r61}, {r405}, {0x0, r162}, {0x0, r503}, {}, {0x0, r440}, {0x0, r379}, {0x0, r392}, {r244}, {}, {r446}, {r385, r429}, {}, {}, {r493, r396}, {r343}, {}, {r421, r478}, {0x0, r359}, {0x0, r461}, {0x0, r409}, {r273}, {r479}, {0x0, r312}, {}, {}, {0x0, r399}, {0x0, r131}], 0x3, "2ebfd7279de82f"}) fallocate(r514, 0x10, 0x7, 0x14) clone(0x40000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) 09:19:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 28) [ 146.355268][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 146.369863][T20287] tmpfs: Unknown parameter 'hash' [ 146.393409][T20289] loop0: detected capacity change from 0 to 1 09:19:17 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:17 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 146.408484][ C0] scsi_io_completion_action: 7 callbacks suppressed [ 146.408512][ C0] sd 0:0:1:0: tag#6416 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 146.422947][T20295] loop1: detected capacity change from 0 to 264192 [ 146.424934][ C0] sd 0:0:1:0: tag#6416 CDB: opcode=0xe5 (vendor) [ 146.437730][ C0] sd 0:0:1:0: tag#6416 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 146.444344][T20297] loop3: detected capacity change from 0 to 264192 09:19:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 146.446855][ C0] sd 0:0:1:0: tag#6416 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 146.462355][ C0] sd 0:0:1:0: tag#6416 CDB[20]: ba [ 146.468182][T20299] FAULT_INJECTION: forcing a failure. [ 146.468182][T20299] name failslab, interval 1, probability 0, space 0, times 0 [ 146.480792][T20299] CPU: 0 PID: 20299 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 146.489550][T20299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.499606][T20299] Call Trace: [ 146.502881][T20299] dump_stack_lvl+0xd6/0x122 [ 146.507471][T20299] dump_stack+0x11/0x1b 09:19:17 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 146.511700][T20299] should_fail+0x23c/0x250 [ 146.516119][T20299] __should_failslab+0x81/0x90 [ 146.520889][T20299] ? __list_lru_init+0x332/0x680 [ 146.525828][T20299] should_failslab+0x5/0x20 [ 146.526324][T20305] loop4: detected capacity change from 0 to 264192 [ 146.530335][T20299] kmem_cache_alloc_trace+0x52/0x320 [ 146.530356][T20299] ? __list_lru_init+0x332/0x680 [ 146.530379][T20299] __list_lru_init+0x332/0x680 [ 146.552137][T20299] alloc_super+0x490/0x520 [ 146.552461][T20306] tmpfs: Unknown parameter 'hash' [ 146.556549][T20299] sget_fc+0x1cf/0x4e0 [ 146.556574][T20299] ? kill_litter_super+0x60/0x60 [ 146.556595][T20299] ? shmem_reconfigure+0x4c0/0x4c0 [ 146.575663][T20299] get_tree_nodev+0x24/0x100 [ 146.580245][T20299] shmem_get_tree+0x18/0x20 [ 146.584801][T20299] vfs_get_tree+0x4a/0x1a0 [ 146.589202][T20299] path_mount+0x11ec/0x1d20 [ 146.593728][T20299] __se_sys_mount+0x24b/0x2f0 [ 146.598474][T20299] __x64_sys_mount+0x63/0x70 [ 146.603061][T20299] do_syscall_64+0x44/0xa0 [ 146.607470][T20299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.613349][T20299] RIP: 0033:0x7f8ca5468f6a [ 146.617773][T20299] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.637463][T20299] RSP: 002b:00007f8ca31bcfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 146.645863][T20299] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 146.653902][T20299] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 146.661856][T20299] RBP: 00007f8ca31bd040 R08: 00007f8ca31bd040 R09: 0000000020001440 [ 146.669808][T20299] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020001440 [ 146.677797][T20299] R13: 00000000200001c0 R14: 00007f8ca31bd000 R15: 0000000020000180 09:19:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 29) [ 146.709663][T20308] tmpfs: Unknown parameter 'hash' [ 146.729165][T20297] loop3: p2 < > p4 [ 146.729204][ T380] loop0: p2 < > p4 [ 146.733433][T20305] loop4: p2 < > p4 [ 146.737051][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 146.741016][T20295] loop1: p2 < > p4 [ 146.750975][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 146.751660][T20310] FAULT_INJECTION: forcing a failure. [ 146.751660][T20310] name failslab, interval 1, probability 0, space 0, times 0 [ 146.770422][T20310] CPU: 1 PID: 20310 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 146.770823][T20297] loop3: p4 size 2097152 extends beyond EOD, [ 146.779241][T20310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.779255][T20310] Call Trace: [ 146.779261][T20310] dump_stack_lvl+0xd6/0x122 [ 146.785334][T20297] truncated [ 146.806330][T20310] dump_stack+0x11/0x1b [ 146.810499][T20310] should_fail+0x23c/0x250 [ 146.814925][T20310] __should_failslab+0x81/0x90 [ 146.819833][T20310] ? __list_lru_init+0x332/0x680 [ 146.824757][T20310] should_failslab+0x5/0x20 [ 146.829331][T20310] kmem_cache_alloc_trace+0x52/0x320 [ 146.834610][T20310] ? __list_lru_init+0x332/0x680 [ 146.839599][T20310] __list_lru_init+0x332/0x680 [ 146.844433][T20310] alloc_super+0x490/0x520 [ 146.848829][T20310] sget_fc+0x1cf/0x4e0 [ 146.852945][T20310] ? kill_litter_super+0x60/0x60 [ 146.857872][T20310] ? shmem_reconfigure+0x4c0/0x4c0 [ 146.863029][T20310] get_tree_nodev+0x24/0x100 [ 146.867639][T20310] shmem_get_tree+0x18/0x20 [ 146.872194][T20310] vfs_get_tree+0x4a/0x1a0 [ 146.876598][T20310] path_mount+0x11ec/0x1d20 [ 146.881146][T20310] __se_sys_mount+0x24b/0x2f0 [ 146.885836][T20310] __x64_sys_mount+0x63/0x70 [ 146.890432][T20310] do_syscall_64+0x44/0xa0 [ 146.894849][T20310] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.900746][T20310] RIP: 0033:0x7f8ca5468f6a [ 146.905150][T20310] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.924788][T20310] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 146.933187][T20310] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 146.941237][T20310] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 146.949205][T20310] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 09:19:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 146.957160][T20310] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 146.965133][T20310] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 146.974535][T20305] loop4: p4 size 2097152 extends beyond EOD, truncated [ 146.981570][T20295] loop1: p4 size 2097152 extends beyond EOD, truncated [ 146.981740][T20312] tmpfs: Unknown parameter 'hash' [ 146.995667][ T380] loop0: p2 < > p4 [ 146.999856][ T380] loop0: p2 size 2 extends beyond EOD, truncated 09:19:17 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1c00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 30) [ 147.025610][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 147.039415][T20314] tmpfs: Unknown parameter 'hash' [ 147.050722][T20316] loop3: detected capacity change from 0 to 264192 [ 147.058898][T20289] loop0: p2 < > p4 [ 147.062838][T20289] loop0: p2 size 2 extends beyond EOD, truncated [ 147.069958][T20314] tmpfs: Unknown parameter 'hash' [ 147.077787][T20289] loop0: p4 size 2097152 extends beyond EOD, truncated [ 147.096487][T20318] FAULT_INJECTION: forcing a failure. [ 147.096487][T20318] name failslab, interval 1, probability 0, space 0, times 0 [ 147.109143][T20318] CPU: 1 PID: 20318 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 147.115610][ T4660] loop3: p2 < > p4 [ 147.117945][T20318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.122327][ T4660] loop3: p4 size 2097152 extends beyond EOD, [ 147.131788][T20318] Call Trace: [ 147.131797][T20318] dump_stack_lvl+0xd6/0x122 [ 147.131821][T20318] dump_stack+0x11/0x1b [ 147.137875][ T4660] truncated [ 147.153038][T20318] should_fail+0x23c/0x250 [ 147.157441][T20318] __should_failslab+0x81/0x90 [ 147.162191][T20318] ? __list_lru_init+0x332/0x680 [ 147.167427][T20318] should_failslab+0x5/0x20 [ 147.171914][T20318] kmem_cache_alloc_trace+0x52/0x320 [ 147.177271][T20318] ? __list_lru_init+0x332/0x680 [ 147.182219][T20318] __list_lru_init+0x332/0x680 [ 147.186971][T20318] alloc_super+0x490/0x520 [ 147.191387][T20318] sget_fc+0x1cf/0x4e0 [ 147.195442][T20318] ? kill_litter_super+0x60/0x60 [ 147.200379][T20318] ? shmem_reconfigure+0x4c0/0x4c0 [ 147.205479][T20318] get_tree_nodev+0x24/0x100 [ 147.210113][T20318] shmem_get_tree+0x18/0x20 [ 147.214600][T20318] vfs_get_tree+0x4a/0x1a0 [ 147.219012][T20318] path_mount+0x11ec/0x1d20 [ 147.223616][T20318] __se_sys_mount+0x24b/0x2f0 [ 147.228280][T20318] __x64_sys_mount+0x63/0x70 [ 147.232883][T20318] do_syscall_64+0x44/0xa0 [ 147.237337][T20318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.243301][T20318] RIP: 0033:0x7f8ca5468f6a [ 147.247741][T20318] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.267343][T20318] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 147.275769][T20318] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 147.283778][T20318] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 147.291757][T20318] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 147.299714][T20318] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 147.307680][T20318] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:17 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:17 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1100000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:17 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000140)=""/220, 0xdc}, {&(0x7f0000000240)=""/51, 0x33}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x100) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r2, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r7 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r5, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r6, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001940)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x34) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r10, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a80)=[{{&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000440)="c7e0317824c93920ebeb3a36ed93f4b8d2f784b76143b14214e87b4768634d6d72b447ea8261c7c0ebcceecad49d7e4533b3c21d0e0a9cf5b0a558", 0x3b}, {&(0x7f0000000480)="19107b620b86570de346805d65a93e9ad16f8d210f990871aa388e29fac1d2cc70e29c239327b3a99143ced56fb1a20c80001a4efc85de72dc49438e33a9514a4f0d1b496cf8dc01fd303096b5e30526b7a4ed936f635b75f63c2f7a45a4a802d962b75c4de0987bc21c68b257702060a40b02daf4af24af368e708f0a075652249378ad9d65e46f096daf4b473d21ef1d6bb32d9a3de6fdabb91428ac8813f48a3461b0bf11afb3a4467f59ed7834da0352ff7d9faedc3d88ada33d1aff9cf01c4d1f168b32c0b87785174f6f507b1a8a2f0a", 0xd3}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="8acfe720f9acf643ffd4a9fbde60ff86f1553ddc282708d98878f1fff33faa1df13cf5e8b3fcea7cb3515af07c75b4636bb50964a08ed91a321c990244d3829056984f5c1506ff227f8e69b95abee0d55e3c8b0109faf29b807e5dab0ff17fb8cb47bbb47b6ce417eb71341f3691e8f5472d84e9d6c1e05fa76bf458239b8ea7c1ab5d9b4bb9739ec2ef2f505d2bab5f45b83b0126c781b691c95509ce33a9f9fea79ccd534133db91933d40c1f776e07ed2", 0xb2}, {&(0x7f0000001640)="3cfa1bd11d2dc229d092792279a28ca00000cc38fdc7e9", 0x17}], 0x5, &(0x7f0000001980)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, r5, 0xffffffffffffffff, 0xffffffffffffffff, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, r0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0, 0x810}}], 0x1, 0x8000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000010000)="601c6d6b646f73663a18600008", 0xd}, {0x0, 0x0, 0x800}, {&(0x7f0000010300)="f8ffff00f0ffffff", 0x8, 0xe}], 0xc400, &(0x7f0000000040)) 09:19:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:17 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1c03000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 147.328633][T20316] loop3: p2 < > p4 [ 147.334051][T20316] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 31) 09:19:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffc, 0x12c, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000400)="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", 0x0, 0x0, 0x20, 0x0, 0x0}) r2 = signalfd4(r0, &(0x7f0000000080)={[0x3]}, 0x8, 0x80800) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x504, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) unshare(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) gettid() ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 147.379360][T20323] tmpfs: Unknown parameter 'hash' [ 147.387322][T20325] loop1: detected capacity change from 0 to 264192 [ 147.412823][T20329] loop0: detected capacity change from 0 to 1 [ 147.419647][T20323] tmpfs: Unknown parameter 'hash' [ 147.440207][T20328] loop3: detected capacity change from 0 to 264192 [ 147.448665][T20332] FAULT_INJECTION: forcing a failure. [ 147.448665][T20332] name failslab, interval 1, probability 0, space 0, times 0 [ 147.458761][ T5609] loop1: p2 < > p4 [ 147.461371][T20332] CPU: 1 PID: 20332 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 147.465588][T20329] loop0: p2 < > p4 [ 147.473907][T20332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.473920][T20332] Call Trace: [ 147.473927][T20332] dump_stack_lvl+0xd6/0x122 [ 147.485465][T20329] loop0: p2 size 2 extends beyond EOD, [ 147.487799][T20332] dump_stack+0x11/0x1b [ 147.487821][T20332] should_fail+0x23c/0x250 [ 147.487836][T20332] __should_failslab+0x81/0x90 [ 147.487859][T20332] ? __list_lru_init+0x332/0x680 [ 147.487878][T20332] should_failslab+0x5/0x20 [ 147.491175][T20329] truncated [ 147.495717][T20332] kmem_cache_alloc_trace+0x52/0x320 [ 147.527905][ T5609] loop1: p4 size 2097152 extends beyond EOD, [ 147.532460][T20332] ? __list_lru_init+0x332/0x680 [ 147.532487][T20332] __list_lru_init+0x332/0x680 [ 147.538552][ T5609] truncated [ 147.543454][T20332] alloc_super+0x490/0x520 [ 147.543506][T20332] sget_fc+0x1cf/0x4e0 [ 147.556018][T20329] loop0: p4 size 2097152 extends beyond EOD, [ 147.559787][T20332] ? kill_litter_super+0x60/0x60 [ 147.559808][T20332] ? shmem_reconfigure+0x4c0/0x4c0 [ 147.565893][T20329] truncated [ 147.579048][T20332] get_tree_nodev+0x24/0x100 [ 147.583645][T20332] shmem_get_tree+0x18/0x20 [ 147.588143][T20332] vfs_get_tree+0x4a/0x1a0 [ 147.592554][T20332] path_mount+0x11ec/0x1d20 [ 147.597094][T20332] __se_sys_mount+0x24b/0x2f0 [ 147.601828][T20332] __x64_sys_mount+0x63/0x70 [ 147.606407][T20332] do_syscall_64+0x44/0xa0 [ 147.610890][T20332] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.616771][T20332] RIP: 0033:0x7f8ca5468f6a [ 147.621239][T20332] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:19:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 147.640918][T20332] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 147.649312][T20332] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 147.657284][T20332] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 147.665246][T20332] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 147.673245][T20332] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 147.681203][T20332] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 147.694855][T20337] tmpfs: Unknown parameter 'hash' 09:19:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 32) 09:19:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xb3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/171) syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) [ 147.718734][ T4660] loop3: p2 < > p4 [ 147.723135][ T4660] loop3: p4 size 2097152 extends beyond EOD, truncated [ 147.744217][T20328] loop3: p2 < > p4 [ 147.757044][T20340] tmpfs: Unknown parameter 'hash' 09:19:18 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020406af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 147.778418][T20328] loop3: p4 size 2097152 extends beyond EOD, truncated [ 147.790618][T20340] tmpfs: Unknown parameter 'hash' [ 147.806102][T20325] loop1: p2 < > p4 [ 147.816657][T20346] loop0: detected capacity change from 0 to 1 [ 147.827172][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 147.827227][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 147.847904][T20347] FAULT_INJECTION: forcing a failure. [ 147.847904][T20347] name failslab, interval 1, probability 0, space 0, times 0 [ 147.860538][T20347] CPU: 0 PID: 20347 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 147.869353][T20347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.879442][T20347] Call Trace: [ 147.882714][T20347] dump_stack_lvl+0xd6/0x122 [ 147.887659][T20347] dump_stack+0x11/0x1b [ 147.891818][T20347] should_fail+0x23c/0x250 [ 147.896231][T20347] __should_failslab+0x81/0x90 [ 147.901072][T20347] ? __list_lru_init+0x332/0x680 [ 147.906025][T20347] should_failslab+0x5/0x20 [ 147.910527][T20347] kmem_cache_alloc_trace+0x52/0x320 [ 147.915816][T20347] ? __list_lru_init+0x332/0x680 [ 147.920831][T20347] __list_lru_init+0x332/0x680 [ 147.925604][T20347] alloc_super+0x490/0x520 [ 147.930026][T20347] sget_fc+0x1cf/0x4e0 [ 147.934142][T20347] ? kill_litter_super+0x60/0x60 [ 147.939087][T20347] ? shmem_reconfigure+0x4c0/0x4c0 [ 147.944201][T20347] get_tree_nodev+0x24/0x100 [ 147.948902][T20347] shmem_get_tree+0x18/0x20 [ 147.953462][T20347] vfs_get_tree+0x4a/0x1a0 [ 147.957880][T20347] path_mount+0x11ec/0x1d20 [ 147.962405][T20347] __se_sys_mount+0x24b/0x2f0 [ 147.967156][T20347] __x64_sys_mount+0x63/0x70 [ 147.971753][T20347] do_syscall_64+0x44/0xa0 [ 147.976238][T20347] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.982172][T20347] RIP: 0033:0x7f8ca5468f6a [ 147.986583][T20347] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.006260][T20347] RSP: 002b:00007f8ca31bcfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 148.014691][T20347] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a 09:19:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 148.022668][T20347] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 148.030773][T20347] RBP: 00007f8ca31bd040 R08: 00007f8ca31bd040 R09: 0000000020001440 [ 148.038767][T20347] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020001440 [ 148.046747][T20347] R13: 00000000200001c0 R14: 00007f8ca31bd000 R15: 0000000020000180 [ 148.058812][T20325] loop1: p4 size 2097152 extends beyond EOD, truncated [ 148.066214][T20346] loop0: p2 < > p4 [ 148.071794][T20346] loop0: p2 size 2 extends beyond EOD, truncated 09:19:18 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:18 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 33) 09:19:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xb3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/171) syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) [ 148.086992][T20346] loop0: p4 size 2097152 extends beyond EOD, truncated [ 148.098263][T20349] tmpfs: Unknown parameter 'hash' [ 148.118864][T20349] tmpfs: Unknown parameter 'hash' [ 148.129654][T20352] loop3: detected capacity change from 0 to 264192 09:19:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:18 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020706af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 148.149806][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 148.180477][T20360] loop1: detected capacity change from 0 to 264192 [ 148.192310][T20359] tmpfs: Unknown parameter 'hash' [ 148.193679][T20363] FAULT_INJECTION: forcing a failure. [ 148.193679][T20363] name failslab, interval 1, probability 0, space 0, times 0 [ 148.209955][T20363] CPU: 1 PID: 20363 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 148.218716][T20363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.228795][T20363] Call Trace: [ 148.232071][T20363] dump_stack_lvl+0xd6/0x122 [ 148.232828][T20352] loop3: p2 < > p4 [ 148.236668][T20363] dump_stack+0x11/0x1b [ 148.236690][T20363] should_fail+0x23c/0x250 [ 148.249090][T20363] __should_failslab+0x81/0x90 [ 148.253861][T20363] ? __list_lru_init+0x332/0x680 [ 148.258826][T20363] should_failslab+0x5/0x20 [ 148.263375][T20363] kmem_cache_alloc_trace+0x52/0x320 [ 148.268659][T20363] ? __list_lru_init+0x332/0x680 [ 148.273590][T20363] __list_lru_init+0x332/0x680 [ 148.278342][T20363] alloc_super+0x490/0x520 [ 148.282746][T20363] sget_fc+0x1cf/0x4e0 [ 148.286804][T20363] ? kill_litter_super+0x60/0x60 [ 148.291725][T20363] ? shmem_reconfigure+0x4c0/0x4c0 [ 148.296951][T20363] get_tree_nodev+0x24/0x100 [ 148.301595][T20363] shmem_get_tree+0x18/0x20 [ 148.306342][T20363] vfs_get_tree+0x4a/0x1a0 [ 148.310884][T20363] path_mount+0x11ec/0x1d20 [ 148.315403][T20363] __se_sys_mount+0x24b/0x2f0 [ 148.320079][T20363] __x64_sys_mount+0x63/0x70 [ 148.324652][T20363] do_syscall_64+0x44/0xa0 [ 148.329058][T20363] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.335074][T20363] RIP: 0033:0x7f8ca5468f6a [ 148.339474][T20363] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.359072][T20363] RSP: 002b:00007f8ca31bcfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 148.367540][T20363] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 148.375519][T20363] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 148.383637][T20363] RBP: 00007f8ca31bd040 R08: 00007f8ca31bd040 R09: 0000000020001440 [ 148.391594][T20363] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020001440 09:19:18 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080)={0x0, 0x2710}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x6a86c2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000100)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) 09:19:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:19 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 148.399552][T20363] R13: 00000000200001c0 R14: 00007f8ca31bd000 R15: 0000000020000180 [ 148.410841][T20362] loop0: detected capacity change from 0 to 1 [ 148.417357][T20352] loop3: p4 size 2097152 extends beyond EOD, truncated [ 148.434757][T20367] tmpfs: Unknown parameter 'hash' 09:19:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:19 executing program 4: acct(&(0x7f0000000040)='./file0\x00') mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x290002, &(0x7f0000000300)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@rq={'rq', 0x3d, 0x8001}}, {@timeout={'timeout', 0x3d, 0x6}}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_lt}, {@obj_type={'obj_type', 0x3d, 'ext4\x00'}}]}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed", 0x281, 0x11580}], 0x0, &(0x7f00000000c0)) [ 148.458829][T20362] loop0: p2 < > p4 [ 148.458920][ T4668] loop1: p2 < > p4 [ 148.464037][T20362] loop0: p2 size 2 extends beyond EOD, truncated [ 148.474401][ T4668] loop1: p4 size 2097152 extends beyond EOD, truncated [ 148.481466][T20362] loop0: p4 size 2097152 extends beyond EOD, truncated [ 148.498238][T20372] loop3: detected capacity change from 0 to 264192 09:19:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 34) [ 148.512215][T20360] loop1: p2 < > p4 [ 148.512858][T20373] tmpfs: Unknown parameter 'hash' [ 148.516655][T20375] loop4: detected capacity change from 0 to 264192 [ 148.528090][T20360] loop1: p4 size 2097152 extends beyond EOD, truncated [ 148.536169][T20375] EXT4-fs error (device loop4): ext4_orphan_get:1393: inode #17: comm syz-executor.4: iget: bogus i_mode (355) 09:19:19 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x1c00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 148.555712][T20375] EXT4-fs error (device loop4): ext4_orphan_get:1398: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 148.573862][T20373] tmpfs: Unknown parameter 'hash' [ 148.578373][T20375] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 148.591225][T20379] FAULT_INJECTION: forcing a failure. [ 148.591225][T20379] name failslab, interval 1, probability 0, space 0, times 0 [ 148.601561][T20372] loop3: p2 < > p4 09:19:19 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020806af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 148.603870][T20379] CPU: 1 PID: 20379 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 148.616416][T20379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.626478][T20379] Call Trace: [ 148.629756][T20379] dump_stack_lvl+0xd6/0x122 [ 148.634409][T20379] dump_stack+0x11/0x1b [ 148.638597][T20379] should_fail+0x23c/0x250 [ 148.643067][T20379] __should_failslab+0x81/0x90 [ 148.647871][T20379] ? __list_lru_init+0x332/0x680 [ 148.652830][T20379] should_failslab+0x5/0x20 [ 148.657337][T20379] kmem_cache_alloc_trace+0x52/0x320 [ 148.662621][T20379] ? __list_lru_init+0x332/0x680 [ 148.667641][T20379] __list_lru_init+0x332/0x680 [ 148.672424][T20379] alloc_super+0x490/0x520 [ 148.676830][T20379] sget_fc+0x1cf/0x4e0 [ 148.680990][T20379] ? kill_litter_super+0x60/0x60 [ 148.685908][T20379] ? shmem_reconfigure+0x4c0/0x4c0 [ 148.691002][T20379] get_tree_nodev+0x24/0x100 [ 148.695735][T20379] shmem_get_tree+0x18/0x20 [ 148.700218][T20379] vfs_get_tree+0x4a/0x1a0 [ 148.704621][T20379] path_mount+0x11ec/0x1d20 [ 148.709137][T20379] __se_sys_mount+0x24b/0x2f0 [ 148.713800][T20379] __x64_sys_mount+0x63/0x70 [ 148.718374][T20379] do_syscall_64+0x44/0xa0 [ 148.722795][T20379] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.728673][T20379] RIP: 0033:0x7f8ca5468f6a [ 148.733089][T20379] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.752677][T20379] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 148.761070][T20379] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 148.769077][T20379] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 148.777129][T20379] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 148.785163][T20379] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 148.793180][T20379] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:19 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x18de, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:19 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000580)={'ipvlan0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000680)={@initdev, 0x0}, &(0x7f00000006c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x72dd9e6da3470b91, &(0x7f0000000700)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000880)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r8 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="00007800d96b72", @ANYRES16=r7, @ANYBLOB="010000000000000000001b0000000c00018008000100", @ANYRES32=r9, @ANYBLOB], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000900)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x100, r3, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x800}, 0x8882) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0xcc, 0x5, 0x7c, 0x81, 0x0, 0x8, 0xe2074, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x446, 0x4, @perf_config_ext={0x3b44ad86, 0x2}, 0x0, 0x29e, 0x1c28, 0x8, 0x4, 0x6, 0x7, 0x0, 0x200, 0x0, 0x7ff}, r1, 0x4, r0, 0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8000, &(0x7f00000002c0)="1d845e19b552a4575ed8ad9fea57161b57dd80e00d011eb68635a331e7e93091c8dc3931a9360d0a365cc755a5efd43fc98c8a7786ba93647efbab8f78c5bf97829865a0e0311586c874391bb4ee0a9ed6f0b323c82947b923623c0341c3420fb900ceff51b9eb82e42907e2fb87c7e3fd3193475912d3909fad08070305d59eeb6baee6fea16f210e9883bbac0d4b2fdf2eb9c419633b9303fbd0a85524ac705bd74b4525303f96a7d908daf42f44c6b580b39f862a8300"/198, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000140)="63a00191ef8cd478af0fe301000000b27c88b9aa2b8903e1e7496aae74c65aa35852e6ace4b37585825f88abba78d272c90ba6e4b3bbcd3a5e7f2fc6f26b7001149ddc41e633ffcd24e8e51132a5946d6a4a3a5f2609776f9c29b38b10fa640295b72d246ac73350ac26b35eb1c2923673ff336f67ed6390a03fe1a4e2e5a4f8e63134736a09f3d3037051b1f656b0a1b2512c2ef6f877e06009e7930fbc60e8d9ac5649d5ef7d5b0a6b910b96353d04b016c63da15297dc88fe160f589fdd8107aef0f6ab5ac459b52322f46f6ef426acd259fea2683a4a6f9b22c709e306bc3bb2c13ee16efe9e83f39c293d34879fdb91d57662") clone(0x302a0000, &(0x7f0000000080)="45a45ee2bd3ec6ebc4f306e986c8318170f62bab78a96d66e4614f77a20550f61f403004c345ead4d3fe70a23b97ee82cb23e7a7093a905d5021", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000003c0)="3836b7daa98ba2bd86d876d833013c7fbfa6ea9d4f1afb6c3f1f0e878e75f0e1a72c5cc059c29d1a0ce9b2d3cbe2014debdb6e95d1470a0d42854994d140af6e41f0266be3490fbb3fbb577fa81e088dfacdc6347120f41d7b82c0b71b79cfb63500b9b44b3188b26dc7898b0a8cdf824cff65a2eb606b8b6293d2971227b0da7704e1292c9d6208df52f384e13191ac8fd554a1e6abe7dceb46cf1ad0b5ad3cd39e142ce10edd57") [ 148.801343][T20375] ext4 filesystem being mounted at /root/syzkaller-testdir823828776/syzkaller.VNlHQs/394/file0 supports timestamps until 2038 (0x7fffffff) [ 148.810212][T20383] loop0: detected capacity change from 0 to 1 [ 148.820287][T20372] loop3: p4 size 2097152 extends beyond EOD, truncated [ 148.833811][ T22] kauditd_printk_skb: 40 callbacks suppressed 09:19:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 35) [ 148.833822][ T22] audit: type=1400 audit(1635499159.458:366): avc: denied { mounton } for pid=20374 comm="syz-executor.4" path="/root/syzkaller-testdir823828776/syzkaller.VNlHQs/394/file0" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 148.876012][T20388] tmpfs: Unknown parameter 'hash' [ 148.884258][ T380] loop0: p2 < > p4 [ 148.888877][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 148.895613][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 148.904693][T20386] loop1: detected capacity change from 0 to 264192 09:19:19 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 148.914289][T20388] tmpfs: Unknown parameter 'hash' [ 148.920674][T20383] loop0: p2 < > p4 [ 148.924612][T20383] loop0: p2 size 2 extends beyond EOD, truncated [ 148.932396][T20383] loop0: p4 size 2097152 extends beyond EOD, truncated [ 148.940847][T20390] FAULT_INJECTION: forcing a failure. [ 148.940847][T20390] name failslab, interval 1, probability 0, space 0, times 0 [ 148.949370][T20394] loop3: detected capacity change from 0 to 264192 [ 148.953483][T20390] CPU: 0 PID: 20390 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 148.968683][T20390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.978737][T20390] Call Trace: [ 148.982004][T20390] dump_stack_lvl+0xd6/0x122 [ 148.986585][T20390] dump_stack+0x11/0x1b [ 148.990724][T20390] should_fail+0x23c/0x250 [ 148.995172][T20390] __should_failslab+0x81/0x90 [ 148.999989][T20390] ? __list_lru_init+0x332/0x680 [ 149.004953][T20390] should_failslab+0x5/0x20 [ 149.009501][T20390] kmem_cache_alloc_trace+0x52/0x320 [ 149.014773][T20390] ? __list_lru_init+0x332/0x680 [ 149.019812][T20390] __list_lru_init+0x332/0x680 [ 149.024660][T20390] alloc_super+0x490/0x520 [ 149.029063][T20390] sget_fc+0x1cf/0x4e0 [ 149.033197][T20390] ? kill_litter_super+0x60/0x60 [ 149.038384][T20390] ? shmem_reconfigure+0x4c0/0x4c0 [ 149.043565][T20390] get_tree_nodev+0x24/0x100 [ 149.048174][T20390] shmem_get_tree+0x18/0x20 [ 149.052663][T20390] vfs_get_tree+0x4a/0x1a0 [ 149.057059][T20390] path_mount+0x11ec/0x1d20 [ 149.061613][T20390] __se_sys_mount+0x24b/0x2f0 [ 149.066276][T20390] __x64_sys_mount+0x63/0x70 [ 149.071221][T20390] do_syscall_64+0x44/0xa0 [ 149.075622][T20390] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.081733][T20390] RIP: 0033:0x7f8ca5468f6a [ 149.086175][T20390] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.105765][T20390] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:19:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 149.114160][T20390] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 149.122190][T20390] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 149.130199][T20390] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 149.138149][T20390] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 149.146099][T20390] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 149.162453][ T5609] loop1: p2 < > p4 [ 149.166647][ T5609] loop1: p4 size 2097152 extends beyond EOD, truncated [ 149.170643][ T22] audit: type=1400 audit(1635499159.788:367): avc: denied { confidentiality } for pid=20391 comm="syz-executor.4" lockdown_reason="unsafe use of perf" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 149.198407][T20397] tmpfs: Unknown parameter 'hash' [ 149.209282][ T4660] loop3: p2 < > p4 09:19:19 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020906af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 36) [ 149.221507][ T4660] loop3: p4 size 2097152 extends beyond EOD, truncated [ 149.229032][T20397] tmpfs: Unknown parameter 'hash' [ 149.238555][T20402] loop0: detected capacity change from 0 to 1 [ 149.245621][ T380] loop1: p2 < > p4 [ 149.251218][T20394] loop3: p2 < > p4 [ 149.251887][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 149.256947][T20394] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 149.271633][T20404] FAULT_INJECTION: forcing a failure. [ 149.271633][T20404] name failslab, interval 1, probability 0, space 0, times 0 [ 149.284239][T20404] CPU: 1 PID: 20404 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 149.288900][T20402] loop0: p2 < > p4 [ 149.293109][T20404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.293122][T20404] Call Trace: [ 149.293129][T20404] dump_stack_lvl+0xd6/0x122 [ 149.297020][T20402] loop0: p2 size 2 extends beyond EOD, 09:19:19 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2600000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 149.306970][T20404] dump_stack+0x11/0x1b [ 149.306994][T20404] should_fail+0x23c/0x250 [ 149.310295][T20402] truncated [ 149.314862][T20404] __should_failslab+0x81/0x90 [ 149.335482][T20402] loop0: p4 size 2097152 extends beyond EOD, [ 149.336779][T20404] ? __list_lru_init+0x332/0x680 [ 149.342886][T20402] truncated [ 149.347763][T20404] should_failslab+0x5/0x20 [ 149.355328][T20404] kmem_cache_alloc_trace+0x52/0x320 [ 149.359549][T20410] tmpfs: Unknown parameter 'hash' [ 149.360614][T20404] ? __list_lru_init+0x332/0x680 09:19:20 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000580)={'ipvlan0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000680)={@initdev, 0x0}, &(0x7f00000006c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x72dd9e6da3470b91, &(0x7f0000000700)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000880)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r8 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="00007800d96b72", @ANYRES16=r7, @ANYBLOB="010000000000000000001b0000000c00018008000100", @ANYRES32=r9, @ANYBLOB], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000900)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x100, r3, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x800}, 0x8882) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0xcc, 0x5, 0x7c, 0x81, 0x0, 0x8, 0xe2074, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x446, 0x4, @perf_config_ext={0x3b44ad86, 0x2}, 0x0, 0x29e, 0x1c28, 0x8, 0x4, 0x6, 0x7, 0x0, 0x200, 0x0, 0x7ff}, r1, 0x4, r0, 0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8000, &(0x7f00000002c0)="1d845e19b552a4575ed8ad9fea57161b57dd80e00d011eb68635a331e7e93091c8dc3931a9360d0a365cc755a5efd43fc98c8a7786ba93647efbab8f78c5bf97829865a0e0311586c874391bb4ee0a9ed6f0b323c82947b923623c0341c3420fb900ceff51b9eb82e42907e2fb87c7e3fd3193475912d3909fad08070305d59eeb6baee6fea16f210e9883bbac0d4b2fdf2eb9c419633b9303fbd0a85524ac705bd74b4525303f96a7d908daf42f44c6b580b39f862a8300"/198, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000140)="63a00191ef8cd478af0fe301000000b27c88b9aa2b8903e1e7496aae74c65aa35852e6ace4b37585825f88abba78d272c90ba6e4b3bbcd3a5e7f2fc6f26b7001149ddc41e633ffcd24e8e51132a5946d6a4a3a5f2609776f9c29b38b10fa640295b72d246ac73350ac26b35eb1c2923673ff336f67ed6390a03fe1a4e2e5a4f8e63134736a09f3d3037051b1f656b0a1b2512c2ef6f877e06009e7930fbc60e8d9ac5649d5ef7d5b0a6b910b96353d04b016c63da15297dc88fe160f589fdd8107aef0f6ab5ac459b52322f46f6ef426acd259fea2683a4a6f9b22c709e306bc3bb2c13ee16efe9e83f39c293d34879fdb91d57662") clone(0x302a0000, &(0x7f0000000080)="45a45ee2bd3ec6ebc4f306e986c8318170f62bab78a96d66e4614f77a20550f61f403004c345ead4d3fe70a23b97ee82cb23e7a7093a905d5021", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000003c0)="3836b7daa98ba2bd86d876d833013c7fbfa6ea9d4f1afb6c3f1f0e878e75f0e1a72c5cc059c29d1a0ce9b2d3cbe2014debdb6e95d1470a0d42854994d140af6e41f0266be3490fbb3fbb577fa81e088dfacdc6347120f41d7b82c0b71b79cfb63500b9b44b3188b26dc7898b0a8cdf824cff65a2eb606b8b6293d2971227b0da7704e1292c9d6208df52f384e13191ac8fd554a1e6abe7dceb46cf1ad0b5ad3cd39e142ce10edd57") 09:19:20 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2c18000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 149.370631][T20404] __list_lru_init+0x332/0x680 [ 149.375438][T20404] alloc_super+0x490/0x520 [ 149.380063][T20404] sget_fc+0x1cf/0x4e0 [ 149.384133][T20404] ? kill_litter_super+0x60/0x60 [ 149.389067][T20404] ? shmem_reconfigure+0x4c0/0x4c0 [ 149.394180][T20404] get_tree_nodev+0x24/0x100 [ 149.398845][T20404] shmem_get_tree+0x18/0x20 [ 149.403352][T20404] vfs_get_tree+0x4a/0x1a0 [ 149.407767][T20404] path_mount+0x11ec/0x1d20 [ 149.412271][T20404] __se_sys_mount+0x24b/0x2f0 [ 149.416947][T20404] __x64_sys_mount+0x63/0x70 [ 149.421609][T20404] do_syscall_64+0x44/0xa0 [ 149.426076][T20404] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.432004][T20404] RIP: 0033:0x7f8ca5468f6a [ 149.436415][T20404] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.456269][T20404] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 149.464680][T20404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 149.472667][T20404] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 149.480637][T20404] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 149.488594][T20404] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 149.496544][T20404] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 149.507396][T20386] loop1: p2 < > p4 09:19:20 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:20 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2e00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000025ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef23", 0x3b, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000000240)="ed4100001f00000000000000d7f4655fd7f4655f0000000000000400021a9774f0030372", 0x24, 0x8c80}], 0x0, &(0x7f0000013800)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x110) 09:19:20 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020a06af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 149.520972][T20386] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 37) [ 149.546617][T20421] loop4: detected capacity change from 0 to 131456 [ 149.555969][T20426] tmpfs: Unknown parameter 'hash' [ 149.564736][T20421] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: casefold flag without casefold feature [ 149.565623][T20427] loop0: detected capacity change from 0 to 1 [ 149.580031][T20425] loop3: detected capacity change from 0 to 264192 [ 149.594818][T20426] tmpfs: Unknown parameter 'hash' [ 149.604186][T20432] loop1: detected capacity change from 0 to 264192 [ 149.611094][T20421] EXT4-fs (loop4): warning: mounting fs with errors, running e2fsck is recommended [ 149.621093][T20421] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.633427][T20431] FAULT_INJECTION: forcing a failure. [ 149.633427][T20431] name failslab, interval 1, probability 0, space 0, times 0 [ 149.634130][ T380] loop0: p2 < > p4 [ 149.646054][T20431] CPU: 0 PID: 20431 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 149.650181][ T4660] loop3: p2 < > p4 [ 149.658574][T20431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.658586][T20431] Call Trace: [ 149.658592][T20431] dump_stack_lvl+0xd6/0x122 [ 149.666877][ T4660] loop3: p4 size 2097152 extends beyond EOD, [ 149.672507][T20431] dump_stack+0x11/0x1b [ 149.672530][T20431] should_fail+0x23c/0x250 [ 149.675790][ T4660] truncated [ 149.698002][T20431] ? __list_lru_init+0x70/0x680 [ 149.702879][T20431] __should_failslab+0x81/0x90 [ 149.707626][T20431] should_failslab+0x5/0x20 [ 149.712111][T20431] __kmalloc+0x6f/0x350 [ 149.716275][T20431] ? kmem_cache_alloc_trace+0x221/0x320 [ 149.721817][T20431] ? __list_lru_init+0x332/0x680 [ 149.726738][T20431] __list_lru_init+0x70/0x680 [ 149.731445][T20431] alloc_super+0x4bf/0x520 [ 149.735841][T20431] sget_fc+0x1cf/0x4e0 [ 149.739905][T20431] ? kill_litter_super+0x60/0x60 [ 149.744885][T20431] ? shmem_reconfigure+0x4c0/0x4c0 [ 149.750038][T20431] get_tree_nodev+0x24/0x100 [ 149.754660][T20431] shmem_get_tree+0x18/0x20 [ 149.759177][T20431] vfs_get_tree+0x4a/0x1a0 [ 149.763575][T20431] path_mount+0x11ec/0x1d20 [ 149.768147][T20431] __se_sys_mount+0x24b/0x2f0 [ 149.772813][T20431] __x64_sys_mount+0x63/0x70 [ 149.777388][T20431] do_syscall_64+0x44/0xa0 [ 149.781822][T20431] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.787793][T20431] RIP: 0033:0x7f8ca5468f6a [ 149.792389][T20431] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.811974][T20431] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 149.820454][T20431] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 149.828517][T20431] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 149.836469][T20431] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:20 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x1a5c00, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c040000f403000427bd7000fedbdf250400000002000000170000003f070000040000000400000009000000c50000000600000009000000030000001f000000fffffffff7ffffff3f000000400000000400000000000000760b00000700000009000000000200001f0000000100000000060000bcd60c1703000000feffffffd034f57106000000ba0300001d0c000002000000020000000001000008000000ae090000feffffff0700000008000000310000000200000002000000880000005a0500000000c51fe925c4aa0000050000000900000051000000f100000001800000850800000500000005000000a084c9180000480003000000b2fc0ecc0300000003000000001000005d1d000008000000200000007b00000001000000cd8100003d000000384a00000100000000000000060000007f000000000000000200000007000000ff7f000004000000651c0000ff0f00008a0a0000aed60000649d8537ff030000040000000000008007000000040000000000000000080000ff07000020000000090000000300000081000000451300006405000007000000fffbffff010001008100000007000000faffffff400000000900000004000000ddf4000000800000040000000800000004000000000400004000000004000000ff0300000c0a000006000000060000000100000007000000070000000900000006000000050000000100000002000000e604fd3c020000000500000001000000f9ffffffff030000000000008900000081000000050000000600000001000080ff7f000001010000ff7f000056000000000000000e000000ffff000009000000ff03000040000000810000007fffffff06000000000800008c510000000000a002000000200000000700000007000000a70300000010000004000000ff7f0000018000000000008000001b0003000000020000000700000008000000767e00000900000018000000fe0a0000800000000400000009000000070000000b01000008000000010001003f00000007000000010100000500000040feffff0200000041e90000090000000900000006000000000000006d8a0000ff03e7fffeff000008000000070000000700000000001b000000000008000000050000000100010001000000b900000006000000ff0100000600000007000000fbffffff000000002d01000000000100f900000009000000020000000600000008000000ff7f00007f00000002000000ff010000000000000200000001000000010400000600000003000000ffffffff01040000fbffffffffffff7f030000000000000000020000020000000000000002000000060000000600000005000000070000008800000002000000600000000200000007000000090000000000000000000000ff070000ff000000000000000800000000000000ffff0000090000002f6465762f62736700000000c91d8b2bddf1a818ae7f238beda1220c9252d7bb9ccc0d7a9cee8d8fb00473ec3adf914bcadf6fa696f9887e9081e54677de83389bb36961314e4059065775fc35a044e1995f646c34ced70e9237f9cc0204c3e06be4996a20f2cc7cf01e4f01a0051225ad8f20c3812c92754d0df676a43a508eb7df86c9051d860080cc6d8bba2c0c903697b9f800"/1210], 0x42c}, 0x1, 0x0, 0x0, 0x800}, 0x240440c0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x1}, 0x1, 0x0, 0x0, 0x4000801}, 0x880) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf09}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe41}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc03}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4fe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x124}, 0x1, 0x0, 0x0, 0xc5c82011f189fa69}, 0x20000004) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000b00000008000600000000002c00028006000e000000000006000e000000000006000b000000000006000b000000000008000700000000001c000280190008000000000006000f0000000000080008000000000008000400000000002c00028008000600000000000800090200000000000000000000000006000b00000000000800030000000000140002"], 0xac}}, 0x0) sendto$inet6(r2, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 149.844464][T20431] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 149.852415][T20431] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 149.861958][ T5609] loop1: p2 < > p4 [ 149.866814][ T5609] loop1: p4 size 2097152 extends beyond EOD, truncated [ 149.869795][T20435] tmpfs: Unknown parameter 'hash' [ 149.881859][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 149.882413][T20432] loop1: p2 < > p4 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:20 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 149.892334][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 149.892605][T20432] loop1: p4 size 2097152 extends beyond EOD, truncated [ 149.909133][T20425] loop3: p2 < > p4 [ 149.913925][ T380] loop0: p2 < > p4 [ 149.917968][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 149.923588][T20425] loop3: p4 size 2097152 extends beyond EOD, truncated [ 149.940140][T20437] tmpfs: Unknown parameter 'hash' 09:19:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 38) [ 149.947539][T20439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20439 comm=syz-executor.4 [ 149.949140][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 149.968135][T20437] tmpfs: Unknown parameter 'hash' 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:20 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x3f00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 149.997821][T20444] FAULT_INJECTION: forcing a failure. [ 149.997821][T20444] name failslab, interval 1, probability 0, space 0, times 0 [ 150.010459][T20444] CPU: 1 PID: 20444 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 150.016702][T20446] tmpfs: Unknown parameter 'hash' [ 150.019219][T20444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.019250][T20444] Call Trace: [ 150.019256][T20444] dump_stack_lvl+0xd6/0x122 [ 150.042146][T20444] dump_stack+0x11/0x1b 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:20 executing program 4: set_mempolicy(0x0, &(0x7f0000000040)=0x1f, 0x9) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/devices\x00', 0x0, 0x0) 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 150.046357][T20444] should_fail+0x23c/0x250 [ 150.050919][T20444] __should_failslab+0x81/0x90 [ 150.055686][T20444] should_failslab+0x5/0x20 [ 150.060182][T20444] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 150.062540][T20449] tmpfs: Unknown parameter 'hash' [ 150.065904][T20444] ? __kmalloc_node+0x30/0x40 [ 150.065925][T20444] __kmalloc_node+0x30/0x40 [ 150.065941][T20444] kvmalloc_node+0x81/0x110 [ 150.084559][T20444] __list_lru_init+0x2d7/0x680 [ 150.089317][T20444] alloc_super+0x4bf/0x520 [ 150.093732][T20444] sget_fc+0x1cf/0x4e0 [ 150.094954][T20451] tmpfs: Unknown parameter 'hash' [ 150.097860][T20444] ? kill_litter_super+0x60/0x60 [ 150.097882][T20444] ? shmem_reconfigure+0x4c0/0x4c0 [ 150.097901][T20444] get_tree_nodev+0x24/0x100 [ 150.097915][T20444] shmem_get_tree+0x18/0x20 [ 150.097940][T20444] vfs_get_tree+0x4a/0x1a0 [ 150.097955][T20444] path_mount+0x11ec/0x1d20 [ 150.131097][T20444] __se_sys_mount+0x24b/0x2f0 [ 150.135825][T20444] __x64_sys_mount+0x63/0x70 [ 150.140531][T20444] do_syscall_64+0x44/0xa0 [ 150.144976][T20444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.150871][T20444] RIP: 0033:0x7f8ca5468f6a [ 150.155265][T20444] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.174879][T20444] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 150.183321][T20444] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 150.191287][T20444] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 150.199287][T20444] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 150.207672][T20444] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 150.215653][T20444] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 150.225213][T20427] loop0: p2 < > p4 [ 150.231707][T20427] loop0: p2 size 2 extends beyond EOD, truncated [ 150.238241][T20442] loop1: detected capacity change from 0 to 264192 09:19:20 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605021506af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:20 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) 09:19:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 39) [ 150.246003][T20427] loop0: p4 size 2097152 extends beyond EOD, truncated [ 150.248900][T20454] loop3: detected capacity change from 0 to 264192 [ 150.269422][T20442] loop1: p2 < > p4 [ 150.277797][T20442] loop1: p4 size 2097152 extends beyond EOD, truncated [ 150.283133][T20456] tmpfs: Unknown parameter 'hash' [ 150.290120][T20454] loop3: p2 < > p4 [ 150.292146][ C1] sd 0:0:1:0: tag#6431 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 150.303799][ C1] sd 0:0:1:0: tag#6431 CDB: opcode=0xe5 (vendor) [ 150.310176][ C1] sd 0:0:1:0: tag#6431 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 150.319116][T20462] loop0: detected capacity change from 0 to 1 [ 150.319207][ C1] sd 0:0:1:0: tag#6431 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 150.334348][ C1] sd 0:0:1:0: tag#6431 CDB[20]: ba [ 150.339735][T20454] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 150.346463][T20460] FAULT_INJECTION: forcing a failure. [ 150.346463][T20460] name failslab, interval 1, probability 0, space 0, times 0 [ 150.359174][T20460] CPU: 1 PID: 20460 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 150.367933][T20460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.378043][T20460] Call Trace: [ 150.381314][T20460] dump_stack_lvl+0xd6/0x122 [ 150.385987][T20460] dump_stack+0x11/0x1b [ 150.387356][T20466] tmpfs: Unknown parameter 'hash' [ 150.390167][T20460] should_fail+0x23c/0x250 [ 150.390189][T20460] __should_failslab+0x81/0x90 [ 150.404396][T20460] ? __list_lru_init+0x332/0x680 [ 150.409421][T20460] should_failslab+0x5/0x20 [ 150.413940][T20460] kmem_cache_alloc_trace+0x52/0x320 [ 150.419630][T20460] ? __kmalloc_node+0x30/0x40 [ 150.424302][T20460] __list_lru_init+0x332/0x680 [ 150.429194][T20460] alloc_super+0x4bf/0x520 [ 150.433664][T20460] sget_fc+0x1cf/0x4e0 [ 150.437914][T20460] ? kill_litter_super+0x60/0x60 [ 150.442834][T20460] ? shmem_reconfigure+0x4c0/0x4c0 [ 150.447935][T20460] get_tree_nodev+0x24/0x100 [ 150.452552][T20460] shmem_get_tree+0x18/0x20 [ 150.457124][T20460] vfs_get_tree+0x4a/0x1a0 [ 150.461519][T20460] path_mount+0x11ec/0x1d20 [ 150.466002][T20460] __se_sys_mount+0x24b/0x2f0 [ 150.470707][T20460] __x64_sys_mount+0x63/0x70 [ 150.475481][T20460] do_syscall_64+0x44/0xa0 [ 150.479924][T20460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.485879][T20460] RIP: 0033:0x7f8ca5468f6a [ 150.490360][T20460] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.510139][T20460] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 150.518582][T20460] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 150.526536][T20460] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 150.534550][T20460] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 150.542498][T20460] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 150.550519][T20460] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 150.562532][ C0] sd 0:0:1:0: tag#6432 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 150.572400][ C0] sd 0:0:1:0: tag#6432 CDB: opcode=0xe5 (vendor) [ 150.578754][ C0] sd 0:0:1:0: tag#6432 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 150.587809][ C0] sd 0:0:1:0: tag#6432 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 09:19:21 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2600000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:21 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) 09:19:21 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 40) [ 150.596867][ C0] sd 0:0:1:0: tag#6432 CDB[20]: ba [ 150.602603][T20462] loop0: p2 < > p4 [ 150.624045][T20462] loop0: p2 size 2 extends beyond EOD, truncated [ 150.631030][T20462] loop0: p4 size 2097152 extends beyond EOD, truncated [ 150.646802][T20473] loop1: detected capacity change from 0 to 264192 [ 150.654568][T20475] tmpfs: Unknown parameter 'hash' [ 150.658650][ C0] sd 0:0:1:0: tag#6433 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 150.669406][ C0] sd 0:0:1:0: tag#6433 CDB: opcode=0xe5 (vendor) [ 150.675753][ C0] sd 0:0:1:0: tag#6433 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 150.684775][ C0] sd 0:0:1:0: tag#6433 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 150.688551][T20479] loop3: detected capacity change from 0 to 264192 [ 150.693838][ C0] sd 0:0:1:0: tag#6433 CDB[20]: ba [ 150.706875][ T380] loop0: p2 < > p4 [ 150.710736][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 150.718160][T20483] FAULT_INJECTION: forcing a failure. [ 150.718160][T20483] name failslab, interval 1, probability 0, space 0, times 0 [ 150.724111][ T380] loop0: p4 size 2097152 extends beyond EOD, [ 150.730837][T20483] CPU: 0 PID: 20483 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 150.730847][ T380] truncated [ 150.730858][T20483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.758779][T20483] Call Trace: [ 150.762046][T20483] dump_stack_lvl+0xd6/0x122 [ 150.766660][T20483] dump_stack+0x11/0x1b [ 150.770812][T20483] should_fail+0x23c/0x250 [ 150.775215][T20483] __should_failslab+0x81/0x90 [ 150.779963][T20483] ? __list_lru_init+0x332/0x680 [ 150.784888][T20483] should_failslab+0x5/0x20 [ 150.789485][T20483] kmem_cache_alloc_trace+0x52/0x320 [ 150.794829][T20483] ? __list_lru_init+0x332/0x680 [ 150.799839][T20483] __list_lru_init+0x332/0x680 [ 150.804590][T20483] alloc_super+0x4bf/0x520 [ 150.808988][T20483] sget_fc+0x1cf/0x4e0 [ 150.813041][T20483] ? kill_litter_super+0x60/0x60 [ 150.817961][T20483] ? shmem_reconfigure+0x4c0/0x4c0 [ 150.823071][T20483] get_tree_nodev+0x24/0x100 [ 150.827645][T20483] shmem_get_tree+0x18/0x20 [ 150.832167][T20483] vfs_get_tree+0x4a/0x1a0 [ 150.836565][T20483] path_mount+0x11ec/0x1d20 [ 150.841105][T20483] __se_sys_mount+0x24b/0x2f0 [ 150.846308][T20483] __x64_sys_mount+0x63/0x70 [ 150.850941][T20483] do_syscall_64+0x44/0xa0 [ 150.855342][T20483] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.861291][T20483] RIP: 0033:0x7f8ca5468f6a [ 150.865684][T20483] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.885336][T20483] RSP: 002b:00007f8ca31bcfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 150.893818][T20483] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 150.901767][T20483] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 150.909719][T20483] RBP: 00007f8ca31bd040 R08: 00007f8ca31bd040 R09: 0000000020001440 [ 150.917682][T20483] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020001440 [ 150.925632][T20483] R13: 00000000200001c0 R14: 00007f8ca31bd000 R15: 0000000020000180 [ 150.942677][ T380] loop0: p2 < > p4 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xde18, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:21 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605022806af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 41) [ 150.946658][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 150.948732][T20479] loop3: p2 < > p4 [ 150.957545][T20473] loop1: p2 < > p4 [ 150.957640][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 150.961930][T20473] loop1: p4 size 2097152 extends beyond EOD, truncated [ 150.974237][T20479] loop3: p4 size 2097152 extends beyond EOD, truncated [ 150.985251][T20486] tmpfs: Unknown parameter 'hash' [ 151.019760][T20489] FAULT_INJECTION: forcing a failure. [ 151.019760][T20489] name failslab, interval 1, probability 0, space 0, times 0 [ 151.032511][T20489] CPU: 0 PID: 20489 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 151.041274][T20489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.043798][T20491] tmpfs: Unknown parameter 'hash' [ 151.051360][T20489] Call Trace: [ 151.051369][T20489] dump_stack_lvl+0xd6/0x122 [ 151.064334][T20489] dump_stack+0x11/0x1b [ 151.068499][T20489] should_fail+0x23c/0x250 [ 151.072979][T20489] __should_failslab+0x81/0x90 [ 151.077739][T20489] ? __list_lru_init+0x332/0x680 [ 151.080198][T20493] tmpfs: Unknown parameter 'hash' [ 151.082761][T20489] should_failslab+0x5/0x20 [ 151.092351][T20489] kmem_cache_alloc_trace+0x52/0x320 [ 151.097773][T20489] ? __list_lru_init+0x332/0x680 [ 151.102791][T20489] __list_lru_init+0x332/0x680 [ 151.107572][T20489] alloc_super+0x4bf/0x520 [ 151.109088][T20495] tmpfs: Unknown parameter 'hash' [ 151.112004][T20489] sget_fc+0x1cf/0x4e0 [ 151.121079][T20489] ? kill_litter_super+0x60/0x60 [ 151.126015][T20489] ? shmem_reconfigure+0x4c0/0x4c0 [ 151.131141][T20489] get_tree_nodev+0x24/0x100 [ 151.135841][T20489] shmem_get_tree+0x18/0x20 [ 151.139156][T20497] tmpfs: Unknown parameter 'hash' [ 151.140354][T20489] vfs_get_tree+0x4a/0x1a0 [ 151.149778][T20489] path_mount+0x11ec/0x1d20 [ 151.154337][T20489] __se_sys_mount+0x24b/0x2f0 [ 151.159048][T20489] __x64_sys_mount+0x63/0x70 [ 151.163642][T20489] do_syscall_64+0x44/0xa0 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 151.167116][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 151.168080][T20489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.183630][T20489] RIP: 0033:0x7f8ca5468f6a [ 151.187383][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 151.188031][T20489] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 151.188050][T20489] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 151.188068][T20489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 151.188100][T20489] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 151.188110][T20489] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 151.204003][T20499] loop0: detected capacity change from 0 to 1 [ 151.217692][T20489] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 09:19:21 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x2e00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 151.217708][T20489] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 151.279624][T20501] loop1: detected capacity change from 0 to 264192 [ 151.286966][T20503] tmpfs: Unknown parameter 'hash' [ 151.293721][T20479] loop3: detected capacity change from 0 to 264192 [ 151.308837][ T380] loop0: p2 < > p4 [ 151.312685][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 151.319644][T20503] tmpfs: Unknown parameter 'hash' [ 151.324994][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 151.333176][T20499] loop0: p2 < > p4 [ 151.337001][T20499] loop0: p2 size 2 extends beyond EOD, truncated [ 151.338727][T20501] loop1: p2 < > p4 [ 151.344078][T20499] loop0: p4 size 2097152 extends beyond EOD, truncated [ 151.354496][T20501] loop1: p4 size 2097152 extends beyond EOD, truncated [ 151.361764][ T380] loop0: p2 < > p4 [ 151.366668][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 151.376217][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 151.425431][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 151.429360][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 151.443439][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 151.455926][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 151.461907][ T7097] udevd[7097]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory 09:19:22 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) 09:19:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 42) 09:19:22 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000080000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:22 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605026406af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:22 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x3309000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 151.476796][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 151.481473][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 151.487284][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 151.533431][ C0] sd 0:0:1:0: tag#6434 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 151.543298][ C0] sd 0:0:1:0: tag#6434 CDB: opcode=0xe5 (vendor) [ 151.547754][T20514] loop1: detected capacity change from 0 to 264192 [ 151.549637][ C0] sd 0:0:1:0: tag#6434 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 151.558101][T20511] loop0: detected capacity change from 0 to 1 [ 151.565136][ C0] sd 0:0:1:0: tag#6434 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 151.580207][ C0] sd 0:0:1:0: tag#6434 CDB[20]: ba [ 151.588720][T20513] tmpfs: Unknown parameter 'hash' [ 151.589230][T20509] loop3: detected capacity change from 0 to 264192 [ 151.601443][T20515] FAULT_INJECTION: forcing a failure. [ 151.601443][T20515] name failslab, interval 1, probability 0, space 0, times 0 [ 151.614049][T20515] CPU: 1 PID: 20515 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 151.622906][T20515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.633175][T20515] Call Trace: [ 151.636475][T20515] dump_stack_lvl+0xd6/0x122 [ 151.641068][T20515] dump_stack+0x11/0x1b [ 151.645262][T20515] should_fail+0x23c/0x250 [ 151.649814][T20515] __should_failslab+0x81/0x90 [ 151.654643][T20515] ? __list_lru_init+0x332/0x680 [ 151.659605][T20515] should_failslab+0x5/0x20 [ 151.664152][T20515] kmem_cache_alloc_trace+0x52/0x320 [ 151.669440][T20515] ? __list_lru_init+0x332/0x680 [ 151.674384][T20515] __list_lru_init+0x332/0x680 [ 151.679230][T20515] alloc_super+0x4bf/0x520 [ 151.683678][T20515] sget_fc+0x1cf/0x4e0 [ 151.687799][T20515] ? kill_litter_super+0x60/0x60 [ 151.692756][T20515] ? shmem_reconfigure+0x4c0/0x4c0 [ 151.697926][T20515] get_tree_nodev+0x24/0x100 [ 151.702514][T20515] shmem_get_tree+0x18/0x20 [ 151.707029][T20515] vfs_get_tree+0x4a/0x1a0 [ 151.711438][T20515] path_mount+0x11ec/0x1d20 [ 151.715983][T20515] __se_sys_mount+0x24b/0x2f0 [ 151.720659][T20515] __x64_sys_mount+0x63/0x70 [ 151.725274][T20515] do_syscall_64+0x44/0xa0 [ 151.729710][T20515] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.735640][T20515] RIP: 0033:0x7f8ca5468f6a [ 151.740094][T20515] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 151.759698][T20515] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 151.768115][T20515] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 151.776086][T20515] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:22 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) [ 151.784182][T20515] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 151.792151][T20515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 151.800142][T20515] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 151.818641][ T4668] loop3: p2 < > p4 [ 151.820176][T20520] tmpfs: Unknown parameter 'hash' [ 151.827671][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 151.839064][ T4660] loop0: p2 < > p4 [ 151.841069][T20514] loop1: p2 < > p4 [ 151.842972][ T4660] loop0: p2 size 2 extends beyond EOD, truncated [ 151.850325][ C1] sd 0:0:1:0: tag#6435 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 151.862908][ C1] sd 0:0:1:0: tag#6435 CDB: opcode=0xe5 (vendor) [ 151.869249][ C1] sd 0:0:1:0: tag#6435 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 151.878313][ C1] sd 0:0:1:0: tag#6435 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 09:19:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:22 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605021506af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 151.887329][ C1] sd 0:0:1:0: tag#6435 CDB[20]: ba [ 151.893961][T20514] loop1: p4 size 2097152 extends beyond EOD, truncated [ 151.902225][ T4660] loop0: p4 size 2097152 extends beyond EOD, truncated [ 151.913549][T20525] tmpfs: Unknown parameter 'hash' [ 151.919044][T20509] loop3: p2 < > p4 09:19:22 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x3409000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 43) [ 151.952345][T20528] loop4: detected capacity change from 0 to 1 [ 151.967215][T20509] loop3: p4 size 2097152 extends beyond EOD, truncated [ 151.978991][T20525] tmpfs: Unknown parameter 'hash' [ 151.984946][T20511] loop0: p2 < > p4 [ 151.997650][T20511] loop0: p2 size 2 extends beyond EOD, truncated [ 152.000208][T20532] loop1: detected capacity change from 0 to 264192 [ 152.004888][T20511] loop0: p4 size 2097152 extends beyond EOD, truncated [ 152.018726][T20528] loop4: p2 < > p4 [ 152.019362][T20530] FAULT_INJECTION: forcing a failure. [ 152.019362][T20530] name failslab, interval 1, probability 0, space 0, times 0 [ 152.023786][T20528] loop4: p2 size 2 extends beyond EOD, truncated [ 152.035157][T20530] CPU: 1 PID: 20530 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 152.050269][T20530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.060338][T20530] Call Trace: [ 152.063616][T20530] dump_stack_lvl+0xd6/0x122 [ 152.068206][T20530] dump_stack+0x11/0x1b [ 152.072439][T20530] should_fail+0x23c/0x250 [ 152.076975][T20530] __should_failslab+0x81/0x90 [ 152.081746][T20530] ? __list_lru_init+0x332/0x680 [ 152.086756][T20530] should_failslab+0x5/0x20 [ 152.091334][T20530] kmem_cache_alloc_trace+0x52/0x320 [ 152.096705][T20530] ? __list_lru_init+0x332/0x680 09:19:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 152.101651][T20530] __list_lru_init+0x332/0x680 [ 152.106428][T20530] alloc_super+0x4bf/0x520 [ 152.110839][T20530] sget_fc+0x1cf/0x4e0 [ 152.115017][T20530] ? kill_litter_super+0x60/0x60 [ 152.119969][T20530] ? shmem_reconfigure+0x4c0/0x4c0 [ 152.125076][T20530] get_tree_nodev+0x24/0x100 [ 152.129122][T20528] loop4: p4 size 2097152 extends beyond EOD, truncated [ 152.129666][T20530] shmem_get_tree+0x18/0x20 [ 152.140981][T20530] vfs_get_tree+0x4a/0x1a0 [ 152.145393][T20530] path_mount+0x11ec/0x1d20 [ 152.149916][T20530] __se_sys_mount+0x24b/0x2f0 [ 152.154593][T20530] __x64_sys_mount+0x63/0x70 [ 152.159224][T20530] do_syscall_64+0x44/0xa0 [ 152.163751][T20530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.169938][T20530] RIP: 0033:0x7f8ca5468f6a [ 152.174360][T20530] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.194067][T20530] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 152.202478][T20530] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 152.210450][T20530] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 152.218420][T20530] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 152.226446][T20530] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 152.234479][T20530] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 152.246377][T20534] tmpfs: Unknown parameter 'hash' 09:19:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 152.260916][ T5609] loop1: p2 < > p4 09:19:22 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020203af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 44) 09:19:22 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4203000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 152.290824][ T5609] loop1: p4 size 2097152 extends beyond EOD, truncated [ 152.304660][T20536] tmpfs: Unknown parameter 'hash' [ 152.326020][T20532] loop1: p2 < > p4 09:19:23 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) [ 152.335113][T20532] loop1: p4 size 2097152 extends beyond EOD, truncated [ 152.349209][T20536] tmpfs: Unknown parameter 'hash' [ 152.352681][T20538] loop0: detected capacity change from 0 to 1 [ 152.360808][T20542] loop3: detected capacity change from 0 to 264192 [ 152.369930][T20541] FAULT_INJECTION: forcing a failure. [ 152.369930][T20541] name failslab, interval 1, probability 0, space 0, times 0 [ 152.382544][T20541] CPU: 1 PID: 20541 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 152.391481][T20541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.396507][ C0] sd 0:0:1:0: tag#6436 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 152.401557][T20541] Call Trace: [ 152.401565][T20541] dump_stack_lvl+0xd6/0x122 [ 152.401594][T20541] dump_stack+0x11/0x1b [ 152.411428][ C0] sd 0:0:1:0: tag#6436 CDB: opcode=0xe5 (vendor) [ 152.414657][T20541] should_fail+0x23c/0x250 09:19:23 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x3f00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 152.419244][ C0] sd 0:0:1:0: tag#6436 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 152.423345][T20541] __should_failslab+0x81/0x90 [ 152.429671][ C0] sd 0:0:1:0: tag#6436 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 152.434051][T20541] ? __list_lru_init+0x332/0x680 [ 152.443084][ C0] sd 0:0:1:0: tag#6436 CDB[20]: ba [ 152.447817][T20541] should_failslab+0x5/0x20 [ 152.471306][T20541] kmem_cache_alloc_trace+0x52/0x320 [ 152.476592][T20541] ? __list_lru_init+0x332/0x680 [ 152.481530][T20541] __list_lru_init+0x332/0x680 [ 152.486398][T20541] alloc_super+0x4bf/0x520 [ 152.490818][T20541] sget_fc+0x1cf/0x4e0 [ 152.495000][T20541] ? kill_litter_super+0x60/0x60 [ 152.499941][T20541] ? shmem_reconfigure+0x4c0/0x4c0 [ 152.505061][T20541] get_tree_nodev+0x24/0x100 [ 152.509647][T20541] shmem_get_tree+0x18/0x20 [ 152.514151][T20541] vfs_get_tree+0x4a/0x1a0 [ 152.518573][T20541] path_mount+0x11ec/0x1d20 [ 152.523127][T20541] __se_sys_mount+0x24b/0x2f0 [ 152.527809][T20541] __x64_sys_mount+0x63/0x70 [ 152.532410][T20541] do_syscall_64+0x44/0xa0 [ 152.536824][T20541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.542912][T20541] RIP: 0033:0x7f8ca5468f6a [ 152.547320][T20541] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.566948][T20541] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 152.575360][T20541] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 152.583334][T20541] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 152.591412][T20541] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 152.599474][T20541] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 152.607446][T20541] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 152.618181][T20550] tmpfs: Unknown parameter 'hash' [ 152.623858][ T4668] loop3: p2 < > p4 [ 152.633004][T20538] loop0: p2 < > p4 09:19:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:23 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) [ 152.637219][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 152.637500][T20552] loop1: detected capacity change from 0 to 264192 [ 152.646242][T20538] loop0: p2 size 2 extends beyond EOD, truncated [ 152.660283][T20538] loop0: p4 size 2097152 extends beyond EOD, truncated [ 152.673442][T20542] loop3: p2 < > p4 [ 152.679010][T20542] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:23 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 152.688772][ T4660] loop1: p2 < > p4 [ 152.690568][ C1] sd 0:0:1:0: tag#6437 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 152.702917][ C1] sd 0:0:1:0: tag#6437 CDB: opcode=0xe5 (vendor) [ 152.702953][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 152.709261][ C1] sd 0:0:1:0: tag#6437 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 152.709281][ C1] sd 0:0:1:0: tag#6437 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 152.734153][ C1] sd 0:0:1:0: tag#6437 CDB[20]: ba 09:19:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 45) 09:19:23 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020205af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 152.761520][T20552] loop1: p2 < > p4 [ 152.766026][T20552] loop1: p4 size 2097152 extends beyond EOD, truncated [ 152.789736][T20660] loop3: detected capacity change from 0 to 264192 [ 152.804541][T20662] FAULT_INJECTION: forcing a failure. 09:19:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:23 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) [ 152.804541][T20662] name failslab, interval 1, probability 0, space 0, times 0 [ 152.817461][T20662] CPU: 1 PID: 20662 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 152.822750][T20668] tmpfs: Unknown parameter 'hash' [ 152.826251][T20662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.826264][T20662] Call Trace: [ 152.826271][T20662] dump_stack_lvl+0xd6/0x122 [ 152.826304][T20662] dump_stack+0x11/0x1b [ 152.853316][T20662] should_fail+0x23c/0x250 09:19:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 152.855212][T20664] loop0: detected capacity change from 0 to 1 [ 152.857742][T20662] __should_failslab+0x81/0x90 [ 152.868551][T20662] ? __list_lru_init+0x332/0x680 [ 152.873535][T20662] should_failslab+0x5/0x20 [ 152.878042][T20662] kmem_cache_alloc_trace+0x52/0x320 [ 152.883332][T20662] ? __list_lru_init+0x332/0x680 [ 152.888324][T20662] __list_lru_init+0x332/0x680 [ 152.893178][T20662] alloc_super+0x4bf/0x520 [ 152.897668][T20662] sget_fc+0x1cf/0x4e0 [ 152.901750][T20662] ? kill_litter_super+0x60/0x60 [ 152.906767][T20662] ? shmem_reconfigure+0x4c0/0x4c0 [ 152.911926][T20662] get_tree_nodev+0x24/0x100 [ 152.916617][T20662] shmem_get_tree+0x18/0x20 [ 152.921121][T20662] vfs_get_tree+0x4a/0x1a0 [ 152.925530][T20662] path_mount+0x11ec/0x1d20 [ 152.930069][T20662] __se_sys_mount+0x24b/0x2f0 [ 152.934748][T20662] __x64_sys_mount+0x63/0x70 [ 152.939332][T20662] do_syscall_64+0x44/0xa0 [ 152.943827][T20662] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.949866][T20662] RIP: 0033:0x7f8ca5468f6a [ 152.954270][T20662] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.965341][ C0] sd 0:0:1:0: tag#6438 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 152.973950][T20662] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 152.973972][T20662] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 152.973982][T20662] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 46) 09:19:23 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) [ 152.973993][T20662] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 152.983806][ C0] sd 0:0:1:0: tag#6438 CDB: opcode=0xe5 (vendor) [ 152.992160][T20662] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 153.000149][ C0] sd 0:0:1:0: tag#6438 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 153.008163][T20662] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 153.016158][ C0] sd 0:0:1:0: tag#6438 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 153.056574][ C0] sd 0:0:1:0: tag#6438 CDB[20]: ba [ 153.086863][ T5609] loop3: p2 < > p4 [ 153.091482][T20664] loop0: p2 < > p4 [ 153.095319][T20664] loop0: p2 size 2 extends beyond EOD, truncated [ 153.108422][ C0] sd 0:0:1:0: tag#6439 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 153.118257][ C0] sd 0:0:1:0: tag#6439 CDB: opcode=0xe5 (vendor) [ 153.124635][ C0] sd 0:0:1:0: tag#6439 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 09:19:23 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 153.130967][T20778] FAULT_INJECTION: forcing a failure. [ 153.130967][T20778] name failslab, interval 1, probability 0, space 0, times 0 [ 153.134104][ C0] sd 0:0:1:0: tag#6439 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 153.146673][T20778] CPU: 1 PID: 20778 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 153.155695][ C0] sd 0:0:1:0: tag#6439 CDB[20]: ba [ 153.164418][T20778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.175315][ T5609] loop3: p4 size 2097152 extends beyond EOD, [ 153.179556][T20778] Call Trace: [ 153.179565][T20778] dump_stack_lvl+0xd6/0x122 [ 153.179587][T20778] dump_stack+0x11/0x1b [ 153.185642][ T5609] truncated [ 153.196079][T20783] cgroup: fork rejected by pids controller in [ 153.197616][T20778] should_fail+0x23c/0x250 [ 153.200740][T20783] /syz4 [ 153.206840][T20778] __should_failslab+0x81/0x90 [ 153.211238][T20783] [ 153.213961][T20778] ? __list_lru_init+0x332/0x680 [ 153.214023][T20778] should_failslab+0x5/0x20 [ 153.230531][T20778] kmem_cache_alloc_trace+0x52/0x320 [ 153.235819][T20778] ? __list_lru_init+0x332/0x680 [ 153.236368][T20664] loop0: p4 size 2097152 extends beyond EOD, truncated [ 153.240805][T20778] __list_lru_init+0x332/0x680 [ 153.252495][T20778] alloc_super+0x4bf/0x520 [ 153.256901][T20778] sget_fc+0x1cf/0x4e0 [ 153.260985][T20778] ? kill_litter_super+0x60/0x60 [ 153.265927][T20778] ? shmem_reconfigure+0x4c0/0x4c0 [ 153.271022][T20778] get_tree_nodev+0x24/0x100 [ 153.275596][T20778] shmem_get_tree+0x18/0x20 [ 153.280200][T20778] vfs_get_tree+0x4a/0x1a0 [ 153.284652][T20778] path_mount+0x11ec/0x1d20 [ 153.289154][T20778] __se_sys_mount+0x24b/0x2f0 [ 153.293816][T20778] __x64_sys_mount+0x63/0x70 [ 153.298411][T20778] do_syscall_64+0x44/0xa0 [ 153.302852][T20778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.308765][T20778] RIP: 0033:0x7f8ca5468f6a [ 153.313162][T20778] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:19:24 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x3f00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 153.332834][T20778] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 153.341317][T20778] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 153.349275][T20778] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 153.357236][T20778] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 153.365208][T20778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 153.373183][T20778] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 153.384174][T20786] tmpfs: Unknown parameter 'hash' [ 153.395726][T20787] loop1: detected capacity change from 0 to 264192 [ 153.417232][T20789] loop4: detected capacity change from 0 to 264192 [ 153.432648][T20660] loop3: p2 < > p4 09:19:24 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4c00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:24 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020207af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 47) 09:19:24 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4000080000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 153.438747][T20660] loop3: p4 size 2097152 extends beyond EOD, truncated [ 153.439626][T20791] tmpfs: Unknown parameter 'hash' [ 153.451318][T20787] loop1: p2 < > p4 [ 153.456281][T20787] loop1: p4 size 2097152 extends beyond EOD, truncated [ 153.463533][T20789] loop4: p2 < > p4 [ 153.468041][T20789] loop4: p4 size 2097152 extends beyond EOD, truncated [ 153.480297][T20791] tmpfs: Unknown parameter 'hash' 09:19:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 153.515928][T20795] loop3: detected capacity change from 0 to 264192 [ 153.516066][T20794] loop0: detected capacity change from 0 to 1 [ 153.540228][T20798] loop1: detected capacity change from 0 to 264192 [ 153.558868][T20800] tmpfs: Unknown parameter 'hash' [ 153.566085][T20801] FAULT_INJECTION: forcing a failure. [ 153.566085][T20801] name failslab, interval 1, probability 0, space 0, times 0 [ 153.578703][T20801] CPU: 0 PID: 20801 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 153.587523][T20801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.597668][T20801] Call Trace: [ 153.600946][T20801] dump_stack_lvl+0xd6/0x122 [ 153.605544][T20801] dump_stack+0x11/0x1b [ 153.609722][T20801] should_fail+0x23c/0x250 [ 153.614140][T20801] __should_failslab+0x81/0x90 [ 153.618917][T20801] ? __list_lru_init+0x332/0x680 [ 153.623907][T20801] should_failslab+0x5/0x20 [ 153.628418][T20801] kmem_cache_alloc_trace+0x52/0x320 [ 153.633707][T20801] ? __list_lru_init+0x332/0x680 [ 153.638688][T20801] __list_lru_init+0x332/0x680 [ 153.643452][T20801] alloc_super+0x4bf/0x520 [ 153.647873][T20801] sget_fc+0x1cf/0x4e0 [ 153.651997][T20801] ? kill_litter_super+0x60/0x60 [ 153.656938][T20801] ? shmem_reconfigure+0x4c0/0x4c0 [ 153.662052][T20801] get_tree_nodev+0x24/0x100 [ 153.666676][ C1] sd 0:0:1:0: tag#6444 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 153.666736][T20801] shmem_get_tree+0x18/0x20 [ 153.676590][ C1] sd 0:0:1:0: tag#6444 CDB: opcode=0xe5 (vendor) [ 153.681014][T20801] vfs_get_tree+0x4a/0x1a0 [ 153.687421][ C1] sd 0:0:1:0: tag#6444 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 153.691809][T20801] path_mount+0x11ec/0x1d20 [ 153.700841][ C1] sd 0:0:1:0: tag#6444 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 09:19:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:24 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3a6c9bddc000000000000000000", @ANYBLOB, @ANYBLOB="000427bd7000ffdbdf251100", @ANYBLOB, @ANYRESOCT, @ANYRES32=r1, @ANYRESHEX, @ANYRESDEC], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x20000804) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40090}, 0x8054) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, 0x0, 0x8010) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="973abe7b478e8c78c6dc37481e443e97ee382d5c46d64a47bf06d61b9ef34d7b8c61b6d86dcb4e8c113e03c8345389d7330ad4f9fc5257826900f6a4641209ae9662c7c6e90de75b23bc29f3b4b52a7851e03540ca8e5c9201f91f906baf269e56d88a92a3cba2cb6b6f4ed3e1a311aa73da7e015f51bc6d11532e0f594456e4a6fcaa3abe11e99e8d2c509b5bed8d0380fee6634e652b246b749617153bf771df5424ed7338c94a23d0239bd2efd266f11d6f47fc9e6bc57e7eba71", @ANYRES16=0x0, @ANYBLOB="020026bd7000fbdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x0, &(0x7f0000000740)="1133383464f76d652aaa0ca9643136c31e74837775945f1f6d57bbfd34a26445bf6fa918", 0x0, &(0x7f0000000800), &(0x7f0000000840)="45db8738464d1e05aa9ac7802921918c8888e76e9a165cfe45844af8c9a73dc4a1bba2e01627ba622d1b76cd684d78ea7229e652f66dd94b") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000d40)=ANY=[], 0xfffffecc) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000780)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1, 0xffffffff}]}, 0x18, 0x3) write$P9_RLERRORu(r6, &(0x7f0000000240)={0x10, 0x7, 0x0, {{0x3, '@@*'}}}, 0x10) [ 153.705280][T20801] __se_sys_mount+0x24b/0x2f0 [ 153.714281][ C1] sd 0:0:1:0: tag#6444 CDB[20]: ba [ 153.724078][T20801] __x64_sys_mount+0x63/0x70 [ 153.728679][T20801] do_syscall_64+0x44/0xa0 [ 153.733172][T20801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.739095][T20801] RIP: 0033:0x7f8ca5468f6a [ 153.743501][T20801] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.763121][T20801] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 153.771514][T20801] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 153.779473][T20801] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 153.787427][T20801] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 153.795378][T20801] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 153.803339][T20801] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f00000000000000005ee9b9726400000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001e2d2000000000000000b00000000040000080000", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000d0a9da48497c4915a7449265c083aec0010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000050000001700a86ee9b0350a64990000000000000f008551", 0x20, 0x800}, {&(0x7f0000000180)="ed41000000040000d1f4655fd1f4655fd101655f00005da56650b75ee22f2300000000c21f98", 0x26, 0x1800}, {&(0x7f0000011000)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000050000000020000000400000052", 0x49, 0x1c00}, {&(0x7f0000000080)="111fc0d9", 0x4, 0x14000}], 0x804, &(0x7f0000013800)=ANY=[]) mount(&(0x7f0000000040)=@sr0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='zonefs\x00', 0x100000, 0x0) 09:19:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 48) [ 153.814483][ T5609] loop0: p2 < > p4 [ 153.818585][T20798] loop1: p2 < > p4 [ 153.823157][T20807] tmpfs: Unknown parameter 'hash' [ 153.828251][ T5609] loop0: p2 size 2 extends beyond EOD, truncated [ 153.829636][T20795] loop3: p2 < > p4 [ 153.835141][T20798] loop1: p4 size 2097152 extends beyond EOD, truncated [ 153.845531][ T5609] loop0: p4 size 2097152 extends beyond EOD, truncated [ 153.845600][T20795] loop3: p4 size 2097152 extends beyond EOD, truncated [ 153.873338][T20821] loop4: detected capacity change from 0 to 1024 [ 153.881181][T20807] tmpfs: Unknown parameter 'hash' [ 153.889698][T20794] loop0: p2 < > p4 [ 153.893830][T20794] loop0: p2 size 2 extends beyond EOD, truncated [ 153.901677][T20823] FAULT_INJECTION: forcing a failure. [ 153.901677][T20823] name failslab, interval 1, probability 0, space 0, times 0 [ 153.905517][T20821] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 153.914427][T20823] CPU: 1 PID: 20823 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 153.923415][T20794] loop0: p4 size 2097152 extends beyond EOD, [ 153.929654][T20823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.929676][T20823] Call Trace: [ 153.929684][T20823] dump_stack_lvl+0xd6/0x122 [ 153.929707][T20823] dump_stack+0x11/0x1b [ 153.929722][T20823] should_fail+0x23c/0x250 [ 153.929738][T20823] __should_failslab+0x81/0x90 [ 153.929768][T20823] ? __list_lru_init+0x332/0x680 [ 153.935841][T20794] truncated [ 153.975113][T20823] should_failslab+0x5/0x20 [ 153.979681][T20823] kmem_cache_alloc_trace+0x52/0x320 [ 153.984991][T20823] ? __list_lru_init+0x332/0x680 [ 153.989932][T20823] __list_lru_init+0x332/0x680 [ 153.994769][T20823] alloc_super+0x4bf/0x520 [ 153.999184][T20823] sget_fc+0x1cf/0x4e0 [ 154.003320][T20823] ? kill_litter_super+0x60/0x60 [ 154.008258][T20823] ? shmem_reconfigure+0x4c0/0x4c0 [ 154.013371][T20823] get_tree_nodev+0x24/0x100 [ 154.017956][T20823] shmem_get_tree+0x18/0x20 09:19:24 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:24 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x5400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 154.022470][T20823] vfs_get_tree+0x4a/0x1a0 [ 154.026935][T20823] path_mount+0x11ec/0x1d20 [ 154.031499][T20823] __se_sys_mount+0x24b/0x2f0 [ 154.031764][T20927] loop3: detected capacity change from 0 to 264192 [ 154.036175][T20823] __x64_sys_mount+0x63/0x70 [ 154.047258][T20823] do_syscall_64+0x44/0xa0 [ 154.051708][T20823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.057853][T20823] RIP: 0033:0x7f8ca5468f6a [ 154.060060][T20928] loop1: detected capacity change from 0 to 264192 [ 154.062302][T20823] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.062321][T20823] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.062338][T20823] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 154.062349][T20823] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 154.071939][T20929] tmpfs: Unknown parameter 'hash' 09:19:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 49) [ 154.088445][T20823] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 154.088461][T20823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 154.088472][T20823] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 154.120200][T20931] FAULT_INJECTION: forcing a failure. [ 154.120200][T20931] name failslab, interval 1, probability 0, space 0, times 0 [ 154.134322][T20927] loop3: p2 < > p4 [ 154.141931][T20931] CPU: 1 PID: 20931 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 154.160682][T20927] loop3: p4 size 2097152 extends beyond EOD, [ 154.167036][T20931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.173165][T20927] truncated [ 154.183313][T20931] Call Trace: [ 154.183323][T20931] dump_stack_lvl+0xd6/0x122 [ 154.194298][T20931] dump_stack+0x11/0x1b [ 154.198537][T20931] should_fail+0x23c/0x250 [ 154.202960][T20931] __should_failslab+0x81/0x90 [ 154.207774][T20931] ? shmem_fill_super+0x48/0x580 [ 154.212717][T20931] should_failslab+0x5/0x20 [ 154.217203][T20931] kmem_cache_alloc_trace+0x52/0x320 [ 154.222471][T20931] ? shmem_reconfigure+0x4c0/0x4c0 [ 154.227576][T20931] shmem_fill_super+0x48/0x580 [ 154.232369][T20931] ? sget_fc+0x4a4/0x4e0 [ 154.236613][T20931] ? kill_litter_super+0x60/0x60 [ 154.241597][T20931] ? shmem_reconfigure+0x4c0/0x4c0 [ 154.246708][T20931] get_tree_nodev+0x73/0x100 [ 154.251277][T20931] shmem_get_tree+0x18/0x20 [ 154.255824][T20931] vfs_get_tree+0x4a/0x1a0 [ 154.260216][T20931] path_mount+0x11ec/0x1d20 [ 154.264776][T20931] __se_sys_mount+0x24b/0x2f0 [ 154.269511][T20931] __x64_sys_mount+0x63/0x70 [ 154.274159][T20931] do_syscall_64+0x44/0xa0 [ 154.278582][T20931] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.284512][T20931] RIP: 0033:0x7f8ca5468f6a [ 154.288906][T20931] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.308543][T20931] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.316968][T20931] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 154.324925][T20931] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 154.332889][T20931] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 154.340872][T20931] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 154.348862][T20931] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 154.368697][T20928] loop1: p2 < > p4 09:19:25 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020209af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:25 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x5500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 50) [ 154.378573][T20928] loop1: p4 size 2097152 extends beyond EOD, truncated [ 154.396474][T20934] tmpfs: Unknown parameter 'hash' [ 154.418192][T20938] tmpfs: Unknown parameter 'hash' 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:25 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x4c00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 154.420461][T20936] loop3: detected capacity change from 0 to 264192 [ 154.426552][T20940] loop0: detected capacity change from 0 to 1 [ 154.455296][T20946] loop1: detected capacity change from 0 to 264192 [ 154.462612][T20940] loop0: p2 < > p4 [ 154.467493][T20944] tmpfs: Unknown parameter 'hash' [ 154.471084][T20940] loop0: p2 size 2 extends beyond EOD, truncated [ 154.475052][T20942] FAULT_INJECTION: forcing a failure. [ 154.475052][T20942] name failslab, interval 1, probability 0, space 0, times 0 [ 154.479317][ T380] loop3: p2 < > p4 [ 154.491591][T20942] CPU: 0 PID: 20942 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 154.504207][T20942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.504533][T20940] loop0: p4 size 2097152 extends beyond EOD, [ 154.514273][T20942] Call Trace: [ 154.514283][T20942] dump_stack_lvl+0xd6/0x122 [ 154.514306][T20942] dump_stack+0x11/0x1b [ 154.520391][T20940] truncated [ 154.523638][T20942] should_fail+0x23c/0x250 [ 154.528419][ T380] loop3: p4 size 2097152 extends beyond EOD, [ 154.532452][T20942] ? shmem_alloc_inode+0x22/0x30 [ 154.532474][T20942] __should_failslab+0x81/0x90 [ 154.535555][ T380] truncated [ 154.558827][T20942] ? shmem_match+0xa0/0xa0 [ 154.563240][T20942] should_failslab+0x5/0x20 [ 154.567727][T20942] kmem_cache_alloc+0x4f/0x300 [ 154.572474][T20942] ? shmem_match+0xa0/0xa0 [ 154.577047][T20942] shmem_alloc_inode+0x22/0x30 [ 154.581795][T20942] new_inode_pseudo+0x38/0x1c0 [ 154.586581][T20942] new_inode+0x21/0x120 [ 154.590734][T20942] shmem_get_inode+0xb7/0x4a0 [ 154.595395][T20942] shmem_fill_super+0x47b/0x580 [ 154.600410][T20942] ? shmem_reconfigure+0x4c0/0x4c0 [ 154.605522][T20942] get_tree_nodev+0x73/0x100 [ 154.610095][T20942] shmem_get_tree+0x18/0x20 [ 154.614631][T20942] vfs_get_tree+0x4a/0x1a0 [ 154.619030][T20942] path_mount+0x11ec/0x1d20 [ 154.623585][T20942] __se_sys_mount+0x24b/0x2f0 [ 154.628315][T20942] __x64_sys_mount+0x63/0x70 [ 154.632936][T20942] do_syscall_64+0x44/0xa0 [ 154.637342][T20942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.643416][T20942] RIP: 0033:0x7f8ca5468f6a [ 154.647878][T20942] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.667490][T20942] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:19:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@crypto_settings=[@NL80211_ATTR_AKM_SUITES={0x4}], @NL80211_ATTR_HE_OBSS_PD={0xc, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x28, r1, 0x10, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x4f}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x801}, 0x2064) r2 = syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="014344303031cb844c494e55582020202020202020202020202020202020202020202020332020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000ec01000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x95, 0x7}, {&(0x7f0000000180)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000000)="88001cf3ffffffffff1b00080000000008008f09140b2a3a08028772", 0x1c, 0xe000}], 0x0, &(0x7f0000000300)=ANY=[]) fchownat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 154.675889][T20942] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 154.683844][T20942] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 154.691861][T20942] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 154.699958][T20942] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 154.707988][T20942] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 154.721028][T20946] loop1: p2 < > p4 09:19:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 51) [ 154.728484][T20946] loop1: p4 size 2097152 extends beyond EOD, truncated [ 154.732197][T20948] loop4: detected capacity change from 0 to 224 [ 154.742775][ T380] loop3: p2 < > p4 [ 154.747289][T20944] tmpfs: Unknown parameter 'hash' [ 154.752566][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 154.766319][T20936] loop3: p2 < > p4 [ 154.771127][T20936] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:25 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60502021daf54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:25 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x5400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 154.771775][T20950] FAULT_INJECTION: forcing a failure. [ 154.771775][T20950] name failslab, interval 1, probability 0, space 0, times 0 [ 154.790616][T20950] CPU: 1 PID: 20950 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 154.799462][T20950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.809599][T20950] Call Trace: [ 154.812870][T20950] dump_stack_lvl+0xd6/0x122 [ 154.817490][T20950] dump_stack+0x11/0x1b [ 154.821660][T20950] should_fail+0x23c/0x250 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 154.826165][T20950] ? security_inode_alloc+0x30/0x180 [ 154.827034][T20954] tmpfs: Unknown parameter 'hash' [ 154.831459][T20950] __should_failslab+0x81/0x90 [ 154.831484][T20950] should_failslab+0x5/0x20 [ 154.845729][T20950] kmem_cache_alloc+0x4f/0x300 [ 154.850556][T20950] security_inode_alloc+0x30/0x180 [ 154.855674][T20950] inode_init_always+0x20b/0x430 [ 154.859332][T20956] tmpfs: Unknown parameter 'hash' [ 154.860624][T20950] ? shmem_match+0xa0/0xa0 [ 154.860648][T20950] new_inode_pseudo+0x73/0x1c0 [ 154.874804][T20950] new_inode+0x21/0x120 [ 154.878988][T20950] shmem_get_inode+0xb7/0x4a0 [ 154.883673][T20950] shmem_fill_super+0x47b/0x580 [ 154.888530][T20950] ? shmem_reconfigure+0x4c0/0x4c0 [ 154.890446][T20960] tmpfs: Unknown parameter 'hash' [ 154.893731][T20950] get_tree_nodev+0x73/0x100 [ 154.903331][T20950] shmem_get_tree+0x18/0x20 [ 154.907858][T20950] vfs_get_tree+0x4a/0x1a0 [ 154.912276][T20950] path_mount+0x11ec/0x1d20 [ 154.914467][T20958] loop0: detected capacity change from 0 to 1 [ 154.916793][T20950] __se_sys_mount+0x24b/0x2f0 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 154.925538][T20957] loop1: detected capacity change from 0 to 264192 [ 154.927540][T20950] __x64_sys_mount+0x63/0x70 [ 154.938594][T20950] do_syscall_64+0x44/0xa0 [ 154.943022][T20950] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.944445][T20962] tmpfs: Unknown parameter 'hash' [ 154.948944][T20950] RIP: 0033:0x7f8ca5468f6a [ 154.948963][T20950] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:19:25 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 154.948978][T20950] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.949001][T20950] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 154.994320][T20950] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 155.002288][T20950] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 155.010243][T20950] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 155.018230][T20950] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 09:19:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 52) 09:19:25 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x5500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 155.050065][T20957] loop1: p2 < > p4 [ 155.050121][ T4660] loop0: p2 < > p4 [ 155.054368][T20957] loop1: p4 size 2097152 extends beyond EOD, truncated [ 155.064749][ T4660] loop0: p2 size 2 extends beyond EOD, truncated [ 155.072416][T21066] tmpfs: Unknown parameter 'hash' [ 155.075221][T21040] loop3: detected capacity change from 0 to 264192 [ 155.085563][ T4660] loop0: p4 size 2097152 extends beyond EOD, truncated [ 155.099193][T20958] loop0: p2 < > p4 [ 155.103114][T20958] loop0: p2 size 2 extends beyond EOD, truncated [ 155.107073][T21070] loop4: detected capacity change from 0 to 264192 [ 155.110393][T20958] loop0: p4 size 2097152 extends beyond EOD, truncated [ 155.124051][T21068] FAULT_INJECTION: forcing a failure. [ 155.124051][T21068] name failslab, interval 1, probability 0, space 0, times 0 [ 155.136661][T21068] CPU: 1 PID: 21068 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 155.145413][T21068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.155506][T21068] Call Trace: [ 155.158813][T21068] dump_stack_lvl+0xd6/0x122 [ 155.163489][T21068] dump_stack+0x11/0x1b [ 155.167690][T21068] should_fail+0x23c/0x250 [ 155.172110][T21068] ? __d_alloc+0x36/0x370 [ 155.176533][T21068] __should_failslab+0x81/0x90 [ 155.181301][T21068] should_failslab+0x5/0x20 [ 155.185790][T21068] kmem_cache_alloc+0x4f/0x300 [ 155.190548][T21068] ? current_time+0xed/0x1a0 [ 155.195228][T21068] __d_alloc+0x36/0x370 [ 155.199525][T21068] d_make_root+0x2a/0xd0 [ 155.203793][T21068] shmem_fill_super+0x4cc/0x580 [ 155.208698][T21068] ? shmem_reconfigure+0x4c0/0x4c0 [ 155.213834][T21068] get_tree_nodev+0x73/0x100 [ 155.218408][T21068] shmem_get_tree+0x18/0x20 [ 155.223004][T21068] vfs_get_tree+0x4a/0x1a0 [ 155.227403][T21068] path_mount+0x11ec/0x1d20 [ 155.231912][T21068] __se_sys_mount+0x24b/0x2f0 [ 155.236579][T21068] __x64_sys_mount+0x63/0x70 [ 155.241194][T21068] do_syscall_64+0x44/0xa0 [ 155.245630][T21068] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.251513][T21068] RIP: 0033:0x7f8ca5468f6a [ 155.256143][T21068] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.275854][T21068] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 155.284249][T21068] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 155.292204][T21068] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:25 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af0a031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:25 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x5500000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 155.300218][T21068] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 155.308172][T21068] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 155.316130][T21068] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 155.328587][T21040] loop3: p2 < > p4 [ 155.339451][T21040] loop3: p4 size 2097152 extends beyond EOD, truncated [ 155.343826][ T380] loop4: p2 < > p4 09:19:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 53) [ 155.350934][T21074] tmpfs: Unknown parameter 'hash' [ 155.354625][T21073] loop0: detected capacity change from 0 to 1 [ 155.363775][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated [ 155.374327][T21076] loop1: detected capacity change from 0 to 264192 [ 155.381710][T21070] loop4: p2 < > p4 [ 155.386182][T21070] loop4: p4 size 2097152 extends beyond EOD, truncated [ 155.393890][T21074] tmpfs: Unknown parameter 'hash' [ 155.399163][T21073] loop0: p2 < > p4 [ 155.403017][T21073] loop0: p2 size 2 extends beyond EOD, truncated [ 155.419866][ T380] loop1: p2 < > p4 [ 155.420543][T21073] loop0: p4 size 2097152 extends beyond EOD, truncated [ 155.429846][T21079] FAULT_INJECTION: forcing a failure. [ 155.429846][T21079] name failslab, interval 1, probability 0, space 0, times 0 [ 155.443188][T21079] CPU: 0 PID: 21079 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 09:19:26 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6300000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 155.445594][T21081] loop3: detected capacity change from 0 to 264192 [ 155.451949][T21079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.451963][T21079] Call Trace: [ 155.451969][T21079] dump_stack_lvl+0xd6/0x122 [ 155.473789][ T380] loop1: p4 size 2097152 extends beyond EOD, [ 155.476403][T21079] dump_stack+0x11/0x1b [ 155.476426][T21079] should_fail+0x23c/0x250 [ 155.482480][ T380] truncated [ 155.486623][T21079] ? alloc_vfsmnt+0x2b/0x2e0 [ 155.498749][T21079] __should_failslab+0x81/0x90 [ 155.503569][T21079] should_failslab+0x5/0x20 [ 155.508134][T21079] kmem_cache_alloc+0x4f/0x300 [ 155.513315][T21079] alloc_vfsmnt+0x2b/0x2e0 [ 155.517774][T21079] vfs_create_mount+0x45/0x270 [ 155.522523][T21079] path_mount+0x195b/0x1d20 [ 155.527088][T21079] __se_sys_mount+0x24b/0x2f0 [ 155.531783][T21079] __x64_sys_mount+0x63/0x70 [ 155.536361][T21079] do_syscall_64+0x44/0xa0 [ 155.540765][T21079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.546723][T21079] RIP: 0033:0x7f8ca5468f6a [ 155.551228][T21079] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.570892][T21079] RSP: 002b:00007f8ca31bcfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 155.579396][T21079] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 155.587456][T21079] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 155.595412][T21079] RBP: 00007f8ca31bd040 R08: 00007f8ca31bd040 R09: 0000000020001440 [ 155.603454][T21079] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020001440 [ 155.611409][T21079] R13: 00000000200001c0 R14: 00007f8ca31bd000 R15: 0000000020000180 [ 155.621986][T21083] tmpfs: Unknown parameter 'hash' [ 155.622360][ T380] loop1: p2 < > p4 [ 155.631512][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 155.639119][T21081] loop3: p2 < > p4 09:19:26 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) 09:19:26 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af25031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 155.649120][T21081] loop3: p4 size 2097152 extends beyond EOD, truncated [ 155.659737][T21076] loop1: p2 < > p4 [ 155.664001][T21076] loop1: p4 size 2097152 extends beyond EOD, truncated [ 155.677555][ C1] sd 0:0:1:0: tag#6445 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.687502][ C1] sd 0:0:1:0: tag#6445 CDB: opcode=0xe5 (vendor) [ 155.693830][ C1] sd 0:0:1:0: tag#6445 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 09:19:26 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6000000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 54) [ 155.702868][ C1] sd 0:0:1:0: tag#6445 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 155.711901][ C1] sd 0:0:1:0: tag#6445 CDB[20]: ba [ 155.720315][T21089] loop0: detected capacity change from 0 to 1 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:26 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 155.743286][T21219] FAULT_INJECTION: forcing a failure. [ 155.743286][T21219] name failslab, interval 1, probability 0, space 0, times 0 [ 155.756158][T21219] CPU: 0 PID: 21219 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 155.764914][T21219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.774965][T21219] Call Trace: [ 155.778229][T21219] dump_stack_lvl+0xd6/0x122 [ 155.782882][T21219] dump_stack+0x11/0x1b [ 155.787045][T21219] should_fail+0x23c/0x250 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 155.791464][T21219] __should_failslab+0x81/0x90 [ 155.794021][T21294] tmpfs: Unknown parameter 'hash' [ 155.796223][T21219] ? get_mountpoint+0x1ab/0x350 [ 155.796249][T21219] should_failslab+0x5/0x20 [ 155.810567][T21219] kmem_cache_alloc_trace+0x52/0x320 [ 155.815859][T21219] ? __legitimize_mnt+0xa4/0x240 [ 155.820828][T21219] get_mountpoint+0x1ab/0x350 [ 155.825567][T21219] lock_mount+0x86/0x1d0 [ 155.826603][T21297] tmpfs: Unknown parameter 'hash' [ 155.829818][T21219] path_mount+0x198b/0x1d20 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 155.839467][T21219] __se_sys_mount+0x24b/0x2f0 [ 155.844146][T21219] __x64_sys_mount+0x63/0x70 [ 155.848484][ C1] sd 0:0:1:0: tag#6446 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 155.848794][T21219] do_syscall_64+0x44/0xa0 [ 155.848821][T21219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.858650][ C1] sd 0:0:1:0: tag#6446 CDB: opcode=0xe5 (vendor) [ 155.858677][ C1] sd 0:0:1:0: tag#6446 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 155.858693][ C1] sd 0:0:1:0: tag#6446 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 155.863079][T21219] RIP: 0033:0x7f8ca5468f6a [ 155.868964][ C1] sd 0:0:1:0: tag#6446 CDB[20]: ba [ 155.875277][T21219] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.898175][T21299] tmpfs: Unknown parameter 'hash' [ 155.902743][T21219] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 155.902764][T21219] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 155.902776][T21219] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 155.902788][T21219] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 155.953932][T21382] tmpfs: Unknown parameter 'hash' [ 155.959663][T21219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 155.959680][T21219] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 155.988744][T21089] loop0: p2 < > p4 09:19:26 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 55) 09:19:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xde180000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 155.992669][T21089] loop0: p2 size 2 extends beyond EOD, truncated [ 156.000407][T21382] tmpfs: Unknown parameter 'hash' [ 156.005904][T21089] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:26 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54021400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 156.042478][T21403] loop1: detected capacity change from 0 to 264192 [ 156.053604][T21405] FAULT_INJECTION: forcing a failure. [ 156.053604][T21405] name failslab, interval 1, probability 0, space 0, times 0 [ 156.064267][T21407] loop3: detected capacity change from 0 to 264192 [ 156.066242][T21405] CPU: 0 PID: 21405 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 156.078170][T21411] loop0: detected capacity change from 0 to 1 [ 156.081536][T21405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.081549][T21405] Call Trace: [ 156.081556][T21405] dump_stack_lvl+0xd6/0x122 [ 156.105724][T21405] dump_stack+0x11/0x1b [ 156.109883][T21405] should_fail+0x23c/0x250 [ 156.114292][T21405] __should_failslab+0x81/0x90 [ 156.119107][T21405] ? get_mountpoint+0x1ab/0x350 [ 156.124007][T21405] should_failslab+0x5/0x20 [ 156.128509][T21405] kmem_cache_alloc_trace+0x52/0x320 [ 156.133916][T21405] ? get_mountpoint+0x335/0x350 09:19:26 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 156.138912][T21405] get_mountpoint+0x1ab/0x350 [ 156.143603][T21405] attach_recursive_mnt+0x9a/0x1230 [ 156.148946][T21405] ? get_mountpoint+0x335/0x350 [ 156.153804][T21405] path_mount+0x1bb6/0x1d20 [ 156.158320][T21405] __se_sys_mount+0x24b/0x2f0 [ 156.163009][T21405] __x64_sys_mount+0x63/0x70 [ 156.167623][T21405] do_syscall_64+0x44/0xa0 [ 156.172043][T21405] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.178148][T21405] RIP: 0033:0x7f8ca5468f6a [ 156.179303][ C1] sd 0:0:1:0: tag#6447 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 156.182618][T21405] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 156.182637][T21405] RSP: 002b:00007f8ca31ddfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 156.192452][ C1] sd 0:0:1:0: tag#6447 CDB: opcode=0xe5 (vendor) [ 156.212109][T21405] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca5468f6a [ 156.212123][T21405] RDX: 0000000020001440 RSI: 00000000200001c0 RDI: 0000000000000000 [ 156.212135][T21405] RBP: 00007f8ca31de040 R08: 00007f8ca31de040 R09: 0000000020001440 [ 156.220541][ C1] sd 0:0:1:0: tag#6447 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 156.226838][T21405] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020001440 [ 156.234811][ C1] sd 0:0:1:0: tag#6447 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 156.242845][T21405] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 156.284952][ C1] sd 0:0:1:0: tag#6447 CDB[20]: ba [ 156.328925][ T380] loop3: p2 < > p4 [ 156.329186][T21403] loop1: p2 < > p4 [ 156.333343][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 156.337010][T21411] loop0: p2 < > p4 [ 156.344110][T21403] loop1: p4 size 2097152 extends beyond EOD, truncated [ 156.347412][T21411] loop0: p2 size 2 extends beyond EOD, truncated [ 156.361514][ T380] loop3: p2 < > p4 [ 156.361865][T21411] loop0: p4 size 2097152 extends beyond EOD, truncated [ 156.365748][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:27 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6300000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 56) 09:19:27 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) 09:19:27 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6a07000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 156.380381][T21407] loop3: p2 < > p4 [ 156.384539][T21407] loop3: p4 size 2097152 extends beyond EOD, truncated [ 156.419055][T21621] tmpfs: Unknown parameter 'hash' 09:19:27 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54041400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 156.424855][T21618] loop1: detected capacity change from 0 to 264192 [ 156.424974][T21617] FAULT_INJECTION: forcing a failure. [ 156.424974][T21617] name failslab, interval 1, probability 0, space 0, times 0 [ 156.444174][T21617] CPU: 1 PID: 21617 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 156.444196][T21617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.444206][T21617] Call Trace: [ 156.444212][T21617] dump_stack_lvl+0xd6/0x122 [ 156.444278][T21617] dump_stack+0x11/0x1b [ 156.444302][T21617] should_fail+0x23c/0x250 [ 156.444320][T21617] ? getname_flags+0x84/0x3f0 [ 156.444339][T21617] __should_failslab+0x81/0x90 [ 156.444357][T21617] should_failslab+0x5/0x20 [ 156.444416][T21617] kmem_cache_alloc+0x4f/0x300 [ 156.444434][T21617] getname_flags+0x84/0x3f0 [ 156.444456][T21617] getname+0x15/0x20 [ 156.444512][T21617] do_sys_openat2+0x6d/0x2b0 [ 156.444528][T21617] ? __se_sys_mount+0x26f/0x2f0 [ 156.444582][T21617] __x64_sys_openat+0xef/0x110 [ 156.444599][T21617] do_syscall_64+0x44/0xa0 [ 156.444655][T21617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.444744][T21617] RIP: 0033:0x7f8ca541a954 [ 156.444756][T21617] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 156.444769][T21617] RSP: 002b:00007f8ca31ddf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 156.444788][T21617] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca541a954 [ 156.444799][T21617] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 156.444841][T21617] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020001440 [ 156.444854][T21617] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 156.444867][T21617] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 156.461901][T21623] loop0: detected capacity change from 0 to 1 [ 156.466455][T21618] loop1: p2 < > p4 09:19:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 57) 09:19:27 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 156.466789][T21618] loop1: p4 size 2097152 extends beyond EOD, truncated [ 156.475620][T21627] loop3: detected capacity change from 0 to 264192 [ 156.558570][T21623] loop0: p2 < > p4 [ 156.657938][T21829] FAULT_INJECTION: forcing a failure. [ 156.657938][T21829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.664520][T21831] loop1: detected capacity change from 0 to 264192 [ 156.671053][T21829] CPU: 1 PID: 21829 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 156.671142][T21829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.671152][T21829] Call Trace: [ 156.677862][T21623] loop0: p2 size 2 extends beyond EOD, [ 156.686366][T21829] dump_stack_lvl+0xd6/0x122 [ 156.686391][T21829] dump_stack+0x11/0x1b [ 156.686408][T21829] should_fail+0x23c/0x250 [ 156.696471][T21623] truncated [ 156.699709][T21829] should_fail_usercopy+0x16/0x20 [ 156.699731][T21829] strncpy_from_user+0x21/0x250 [ 156.722564][T21623] loop0: p4 size 2097152 extends beyond EOD, [ 156.726452][T21829] getname_flags+0xb8/0x3f0 [ 156.731338][T21623] truncated [ 156.737360][T21829] getname+0x15/0x20 [ 156.748847][T21829] do_sys_openat2+0x6d/0x2b0 [ 156.753453][T21829] ? __se_sys_mount+0x26f/0x2f0 [ 156.758301][T21829] __x64_sys_openat+0xef/0x110 [ 156.763063][T21829] do_syscall_64+0x44/0xa0 [ 156.767513][T21829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.773417][T21829] RIP: 0033:0x7f8ca541a954 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 156.777826][T21829] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 156.797461][T21829] RSP: 002b:00007f8ca31ddf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 156.805868][T21829] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca541a954 [ 156.813860][T21829] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c 09:19:27 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6300000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 156.821838][T21829] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020001440 [ 156.821856][T21829] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 156.821869][T21829] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 156.822409][ T380] loop3: p2 < > p4 [ 156.823158][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 156.824588][ T380] loop3: p2 < > p4 [ 156.825028][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 156.828096][T21627] loop3: p2 < > p4 [ 156.847879][T21835] loop4: detected capacity change from 0 to 264192 09:19:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 58) [ 156.851441][T21627] loop3: p4 size 2097152 extends beyond EOD, [ 156.861513][T21831] loop1: p2 < > p4 [ 156.864890][T21627] truncated [ 156.885119][T21833] tmpfs: Unknown parameter 'hash' [ 156.900485][T21831] loop1: p4 size 2097152 extends beyond EOD, truncated [ 156.909918][T21837] FAULT_INJECTION: forcing a failure. [ 156.909918][T21837] name failslab, interval 1, probability 0, space 0, times 0 [ 156.918698][T21835] loop4: p2 < > p4 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 156.922583][T21837] CPU: 1 PID: 21837 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 156.926882][T21835] loop4: p4 size 2097152 extends beyond EOD, [ 156.935079][T21837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.935093][T21837] Call Trace: [ 156.935100][T21837] dump_stack_lvl+0xd6/0x122 [ 156.935124][T21837] dump_stack+0x11/0x1b [ 156.941241][T21835] truncated [ 156.951223][T21837] should_fail+0x23c/0x250 [ 156.951246][T21837] ? __alloc_file+0x2e/0x1a0 [ 156.975347][T21837] __should_failslab+0x81/0x90 09:19:27 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54051400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 156.977755][T21839] tmpfs: Unknown parameter 'hash' [ 156.980199][T21837] should_failslab+0x5/0x20 [ 156.980223][T21837] kmem_cache_alloc+0x4f/0x300 [ 156.980242][T21837] __alloc_file+0x2e/0x1a0 [ 156.998980][T21837] alloc_empty_file+0xcd/0x1c0 [ 157.003835][T21837] path_openat+0x6a/0x1ec0 [ 157.008269][T21837] ? mod_objcg_state+0x3ff/0x650 [ 157.013342][T21837] do_filp_open+0x105/0x220 [ 157.015209][T21842] tmpfs: Unknown parameter 'hash' [ 157.018019][T21837] do_sys_openat2+0xb5/0x2b0 [ 157.018043][T21837] ? __se_sys_mount+0x26f/0x2f0 09:19:27 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6b07000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 157.018065][T21837] __x64_sys_openat+0xef/0x110 [ 157.037381][T21837] do_syscall_64+0x44/0xa0 [ 157.041879][T21837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 157.047800][T21837] RIP: 0033:0x7f8ca541a954 [ 157.050653][T21845] tmpfs: Unknown parameter 'hash' [ 157.052235][T21837] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 157.073597][T21843] loop0: detected capacity change from 0 to 1 09:19:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 59) [ 157.077179][T21837] RSP: 002b:00007f8ca31ddf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 157.091640][T21837] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca541a954 [ 157.093587][T21847] tmpfs: Unknown parameter 'hash' [ 157.099747][T21837] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 157.099769][T21837] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020001440 [ 157.099780][T21837] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 157.099790][T21837] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 157.146358][T21849] FAULT_INJECTION: forcing a failure. [ 157.146358][T21849] name failslab, interval 1, probability 0, space 0, times 0 [ 157.159070][T21849] CPU: 1 PID: 21849 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 157.162699][T21851] loop3: detected capacity change from 0 to 264192 [ 157.167828][T21849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.184373][T21849] Call Trace: [ 157.187689][T21849] dump_stack_lvl+0xd6/0x122 [ 157.192269][T21849] dump_stack+0x11/0x1b [ 157.196409][T21849] should_fail+0x23c/0x250 [ 157.200862][T21849] ? security_file_alloc+0x30/0x190 [ 157.206065][T21849] __should_failslab+0x81/0x90 [ 157.210817][T21849] should_failslab+0x5/0x20 [ 157.215407][T21849] kmem_cache_alloc+0x4f/0x300 [ 157.220265][T21849] security_file_alloc+0x30/0x190 [ 157.225277][T21849] __alloc_file+0x83/0x1a0 [ 157.229796][T21849] alloc_empty_file+0xcd/0x1c0 [ 157.234595][T21849] path_openat+0x6a/0x1ec0 [ 157.239057][T21849] ? mod_objcg_state+0x3ff/0x650 [ 157.243995][T21849] do_filp_open+0x105/0x220 [ 157.248523][T21849] do_sys_openat2+0xb5/0x2b0 [ 157.253121][T21849] ? __se_sys_mount+0x26f/0x2f0 [ 157.258100][T21849] __x64_sys_openat+0xef/0x110 [ 157.262929][T21849] do_syscall_64+0x44/0xa0 [ 157.267406][T21849] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 157.273287][T21849] RIP: 0033:0x7f8ca541a954 [ 157.277684][T21849] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 157.297475][T21849] RSP: 002b:00007f8ca31ddf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 157.305873][T21849] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca541a954 [ 157.313830][T21849] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 157.321785][T21849] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020001440 09:19:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 157.329742][T21849] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 157.337696][T21849] R13: 00000000200001c0 R14: 00007f8ca31de000 R15: 0000000020000180 [ 157.347270][T21843] loop0: p2 < > p4 [ 157.351204][T21843] loop0: p2 size 2 extends beyond EOD, truncated [ 157.358715][T21843] loop0: p4 size 2097152 extends beyond EOD, truncated [ 157.369753][T21853] tmpfs: Unknown parameter 'hash' [ 157.378786][T21851] loop3: p2 < > p4 09:19:28 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6803000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 60) 09:19:28 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 157.383906][T21851] loop3: p4 size 2097152 extends beyond EOD, truncated [ 157.394374][ T380] loop0: p2 < > p4 [ 157.398269][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 157.406776][T21853] tmpfs: Unknown parameter 'hash' [ 157.415286][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 157.425242][T21857] loop1: detected capacity change from 0 to 264192 [ 157.431165][ C0] scsi_io_completion_action: 1 callbacks suppressed [ 157.431189][ C0] sd 0:0:1:0: tag#6449 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 157.448213][ C0] sd 0:0:1:0: tag#6449 CDB: opcode=0xe5 (vendor) [ 157.454616][ C0] sd 0:0:1:0: tag#6449 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 157.463665][ C0] sd 0:0:1:0: tag#6449 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 157.472697][ C0] sd 0:0:1:0: tag#6449 CDB[20]: ba [ 157.478787][T21860] FAULT_INJECTION: forcing a failure. [ 157.478787][T21860] name failslab, interval 1, probability 0, space 0, times 0 [ 157.491406][T21860] CPU: 0 PID: 21860 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 157.494891][ T380] loop0: p2 < > p4 [ 157.500160][T21860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.500242][T21860] Call Trace: [ 157.514582][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 157.517873][T21860] dump_stack_lvl+0xd6/0x122 [ 157.528778][T21860] dump_stack+0x11/0x1b [ 157.532949][T21860] should_fail+0x23c/0x250 [ 157.537447][T21860] ? __d_alloc+0x36/0x370 [ 157.541842][T21860] __should_failslab+0x81/0x90 [ 157.546590][T21860] should_failslab+0x5/0x20 [ 157.551117][T21860] kmem_cache_alloc+0x4f/0x300 [ 157.555866][T21860] __d_alloc+0x36/0x370 [ 157.560023][T21860] d_alloc_cursor+0x20/0x80 [ 157.564557][T21860] dcache_dir_open+0x1d/0x50 [ 157.569205][T21860] ? simple_lookup+0x90/0x90 [ 157.573892][T21860] do_dentry_open+0x52c/0x860 [ 157.578567][T21860] vfs_open+0x43/0x50 [ 157.582539][T21860] path_openat+0x17c3/0x1ec0 [ 157.587122][T21860] do_filp_open+0x105/0x220 [ 157.591732][T21860] do_sys_openat2+0xb5/0x2b0 [ 157.596308][T21860] ? __se_sys_mount+0x26f/0x2f0 [ 157.601237][T21860] __x64_sys_openat+0xef/0x110 [ 157.605985][T21860] do_syscall_64+0x44/0xa0 [ 157.610527][T21860] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 157.616421][T21860] RIP: 0033:0x7f8ca541a954 [ 157.620821][T21860] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 157.640409][T21860] RSP: 002b:00007f8ca31bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 157.648857][T21860] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ca541a954 [ 157.656812][T21860] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 157.664768][T21860] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020001440 [ 157.672796][T21860] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 09:19:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:28 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6c00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:28 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54061400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 157.680756][T21860] R13: 00000000200001c0 R14: 00007f8ca31bd000 R15: 0000000020000180 [ 157.699658][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 157.709700][T21862] tmpfs: Unknown parameter 'hash' [ 157.727926][T21864] loop3: detected capacity change from 0 to 264192 09:19:28 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "b17756e984305eb9ed1f010d8d8a3c7bfc79546db608057c4a9b5af964234de636a50b04d3be742df2077cc113afbfe8667d8ba8d0432784aa3ea8a8857737d8db9ffad38f5b13d17b280c7e768b7af5135c17568b948f77bc0551b600e09aabe82ca63d1c5f26eb3e55481cd77d0a570cd158accb309a94199e441f178a6963bfafbe8649dac5d261ae80dde51ecc66ba0ff5ee340a6c3669c6d301cb9b981478c9cf14d9be93440b3abc1160cd0c5d7a695bdf68ec6dea2608f3c7435f69e1fa2121425512b33fe5ab0cc4f8cf18d4e07c4143c74261658810f92963c151326839b8c3cac2a90a7c822a61d4c8fd66d87a93c06801d3c381197776c26a265f", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 157.730880][T21857] loop1: p2 < > p4 [ 157.743024][T21857] loop1: p4 size 2097152 extends beyond EOD, truncated [ 157.753628][ T380] loop1: p2 < > p4 [ 157.758056][ C1] sd 0:0:1:0: tag#6450 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 157.759338][T21869] loop0: detected capacity change from 0 to 1 [ 157.767912][ C1] sd 0:0:1:0: tag#6450 CDB: opcode=0xe5 (vendor) [ 157.774401][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 157.780317][ C1] sd 0:0:1:0: tag#6450 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 157.780335][ C1] sd 0:0:1:0: tag#6450 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 157.780350][ C1] sd 0:0:1:0: tag#6450 CDB[20]: ba [ 157.781045][T21864] loop3: p2 < > p4 [ 157.815626][T21864] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:28 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) 09:19:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 61) [ 157.838743][T21869] loop0: p2 < > p4 [ 157.842597][T21869] loop0: p2 size 2 extends beyond EOD, truncated [ 157.864183][T21972] FAULT_INJECTION: forcing a failure. [ 157.864183][T21972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.877295][T21972] CPU: 1 PID: 21972 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0 [ 157.879533][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 157.886068][T21972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.905818][T21972] Call Trace: [ 157.909184][T21972] dump_stack_lvl+0xd6/0x122 [ 157.913790][T21972] dump_stack+0x11/0x1b [ 157.918108][T21972] should_fail+0x23c/0x250 [ 157.919734][T21976] tmpfs: Unknown parameter 'hash' [ 157.922520][T21972] should_fail_usercopy+0x16/0x20 [ 157.922544][T21972] _copy_to_user+0x1c/0x90 [ 157.936989][T21972] simple_read_from_buffer+0xab/0x120 [ 157.941971][T21869] loop0: p4 size 2097152 extends beyond EOD, truncated [ 157.942429][T21972] proc_fail_nth_read+0x10d/0x150 [ 157.951067][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 157.954277][T21972] ? proc_fault_inject_write+0x230/0x230 [ 157.969579][T21972] vfs_read+0x1e6/0x750 [ 157.973797][T21972] ? __fget_light+0x21b/0x260 [ 157.978493][T21972] ? __cond_resched+0x11/0x40 [ 157.983186][T21972] ksys_read+0xd9/0x190 [ 157.987342][T21972] __x64_sys_read+0x3e/0x50 [ 157.991862][T21972] do_syscall_64+0x44/0xa0 [ 157.996277][T21972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 158.002286][T21972] RIP: 0033:0x7f8ca541a5ec [ 158.006682][T21972] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 158.026482][T21972] RSP: 002b:00007f8ca31de170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 09:19:28 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6c00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:28 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x6c07000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 158.034902][T21972] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f8ca541a5ec [ 158.042856][T21972] RDX: 000000000000000f RSI: 00007f8ca31de1e0 RDI: 0000000000000004 [ 158.050831][T21972] RBP: 00007f8ca31de1d0 R08: 0000000000000000 R09: 0000000020001440 [ 158.058790][T21972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.066747][T21972] R13: 00007ffc9f1fe4ef R14: 00007f8ca31de300 R15: 0000000000022000 09:19:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:28 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) pipe2(0x0, 0x0) pipe2(0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000600)={0x0, 0x0, "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", "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"}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x6, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="00e393e1a41d28e598979ba9f69459d7269395402d80e8869430000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24350df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fbed65516091000274eb96548bdc400000000000000000000000023c4a12140a0b04fb202a59d9ec47ff476bf93"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{r6}, 0x0, 0x10000000000000af, 0x4c}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b500)={0x0, [{r3, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r2}], 0x0, "a3ee270ff0fa92"}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f00000005c0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 158.085966][T21980] loop1: detected capacity change from 0 to 264192 [ 158.094358][ T380] loop0: p2 < > p4 [ 158.094711][T22053] tmpfs: Unknown parameter 'hash' [ 158.107810][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 158.114561][T22082] loop3: detected capacity change from 0 to 264192 [ 158.121920][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 158.135064][ C0] sd 0:0:1:0: tag#6451 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 158.144936][ C0] sd 0:0:1:0: tag#6451 CDB: opcode=0xe5 (vendor) [ 158.151255][ C0] sd 0:0:1:0: tag#6451 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 158.160305][ C0] sd 0:0:1:0: tag#6451 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 158.169322][ C0] sd 0:0:1:0: tag#6451 CDB[20]: ba [ 158.175136][T22053] tmpfs: Unknown parameter 'hash' [ 158.180268][T21980] loop1: p2 < > p4 09:19:28 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54071400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:28 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r1, 0x0, r1) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/1621], 0x656) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fsopen(&(0x7f00000000c0)='logfs\x00', 0x1) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000100)={{r0}, 0x1, 0x800, 0x800}) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000140)='logfs\x00', &(0x7f0000000180)='$}#{):\xef\x00', 0x0) r3 = signalfd(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) r4 = eventfd2(0x5, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x1c048, &(0x7f0000000940)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '$}#{):\xef\x00'}}, {@fscache}, {@cache_fscache}, {@cachetag={'cachetag', 0x3d, '$*'}}, {@access_any}, {@debug={'debug', 0x3d, 0x2b}}, {@cachetag={'cachetag', 0x3d, 'logfs\x00'}}, {@access_client}, {@nodevmap}], [{@smackfsdef={'smackfsdef', 0x3d, 'logfs\x00'}}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfshat={'smackfshat', 0x3d, 'logfs\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@obj_user={'obj_user', 0x3d, '$}#{):\xef\x00'}}, {@subj_type={'subj_type', 0x3d, '^%'}}, {@smackfshat={'smackfshat', 0x3d, '*--'}}]}}) io_setup(0xc9, &(0x7f0000000080)=0x0) io_submit(r5, 0x0, 0x0) 09:19:28 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7200000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 158.180648][T21980] loop1: p4 size 2097152 extends beyond EOD, truncated [ 158.199423][ T380] loop3: p2 < > p4 [ 158.208947][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 158.227692][T22082] loop3: p2 < > p4 [ 158.230127][T22088] loop0: detected capacity change from 0 to 1 09:19:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 158.244378][T22082] loop3: p4 size 2097152 extends beyond EOD, truncated [ 158.260465][T22090] tmpfs: Unknown parameter 'hash' [ 158.279132][T22090] tmpfs: Unknown parameter 'hash' [ 158.281447][T22097] loop1: detected capacity change from 0 to 264192 09:19:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:28 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 158.287552][T22092] 9pnet: Insufficient options for proto=fd [ 158.297447][T22088] loop0: p2 < > p4 [ 158.301632][T22088] loop0: p2 size 2 extends beyond EOD, truncated [ 158.309491][T22088] loop0: p4 size 2097152 extends beyond EOD, truncated [ 158.309641][ T380] loop1: p2 < > p4 [ 158.320984][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 158.337462][T22097] loop1: p2 < > p4 09:19:29 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54081400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 158.341033][T22100] loop3: detected capacity change from 0 to 264192 [ 158.341906][T22097] loop1: p4 size 2097152 extends beyond EOD, truncated [ 158.357962][T22101] tmpfs: Unknown parameter 'hash' [ 158.379884][T22101] tmpfs: Unknown parameter 'hash' 09:19:29 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:29 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7a00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 158.391028][T22174] loop0: detected capacity change from 0 to 1 [ 158.396639][ T380] loop3: p2 < > p4 [ 158.404727][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 158.411469][T22207] loop1: detected capacity change from 0 to 264192 [ 158.420003][T22100] loop3: p2 < > p4 [ 158.424444][T22100] loop3: p4 size 2097152 extends beyond EOD, truncated [ 158.430032][T22174] loop0: p2 < > p4 [ 158.435243][T22174] loop0: p2 size 2 extends beyond EOD, truncated 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 158.442927][T22209] tmpfs: Unknown parameter 'hash' [ 158.448243][T22174] loop0: p4 size 2097152 extends beyond EOD, truncated [ 158.455479][T22207] loop1: p2 < > p4 [ 158.459751][T22207] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:29 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54091400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7a00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 158.517899][T22213] tmpfs: Unknown parameter 'hash' [ 158.528382][T22215] loop3: detected capacity change from 0 to 264192 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 158.559035][T22213] tmpfs: Unknown parameter 'hash' [ 158.564587][T22219] loop0: detected capacity change from 0 to 1 [ 158.573034][T22220] loop1: detected capacity change from 0 to 264192 [ 158.584790][T22215] loop3: p2 < > p4 [ 158.591376][T22215] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountstats\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket(0xb, 0x80000, 0x0) r3 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00'}) bind(r3, &(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x48, 0x61, "7d88fb1211a8107d0a7eac53491f15bf10b803ebfed06241af514e243729df255c8bdd65c8fbe4c2b6c8730ba10d96b9667e9b9c72adb5950d7d8c15b04d1a", 0x1d}, 0x80) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00'}) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) r4 = fsmount(r0, 0x0, 0x80) sendmsg$sock(r4, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="2b96da87ff3efa2abce104637d14e4f0183e23537cb34389fd85da30e2adc709f1e5b20f7a4b87b236f7b62ff77c41ca31d61e6e6079a510d5f07b49da5c4fa1b54c3536c7ca3a530ab7a202b7af88a905eeea643b93050a79d2ce6f6d0ac0f59d350cedc47bb8f74996530f22a439d61ab326ca2459558348296c8c3c294c60b703dd3434369fe49e1ed32b495e02d4e036945c576cf5b39a568bdcf1b04e9ab2dc4e289ea86572fa80a4", 0xab}, {&(0x7f0000000280)="602b93c95840f519e98414b2896f2b26f3187cf97a7b8a3c20e215b894614f8f78f41f78bdd2ff9ff9a3f3cce55417f9ebebe106f8557d73b4063fc0742c012d28d81b83a157a87fde87931ccde8ed26e6c0733f4f11640b09f7e4c0a122534311f84c268fe03b2905d5779797b9d0c373e4f6f04e3ca21a9ade06b5a861104ee0e99f03e2b776de9e0c7ad2f85d74da31d91d1e1882d3a160bd45b6d2daa4307a6ea3b5949d6e7f5c357b5623", 0xad}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="f09498802d723d6094b69cac7aff0b637a4274a2eda08b1ea2bfa431393b62498995d81fcb9b9017a40aa782ae6f0593b4bc706e17c8b82aebb8ff21302b016af063e4dda2feaa15131f3b0decbc7d3c37490a97c46bb76bcfea0213273ac4a90842ea470be7355915f55f813ade6dbaddc62f6fd175e9de0ecf29f986fba0fee6", 0x81}, {&(0x7f0000001400)="3c5132f6c64628d24569e1766a2179adfbc31904e45beeec602ce19dc7bd5b52c9bee7adc5b0954d2091e8f0f9033b36560f1d1e2dcfad80964e07d50e647201800d4d4356af32e9ce8aeb801adc0ef684a40ca72a3fb04f2bcd4be5dbd6c34ec7ad572ff083885ec4e3902fa30039ac02468f3911f7d1dc0ae3ed644706f5cfc0d291bd409b80d7860502a9db52a3234826c746bbaa17999a2c9a44563cf73a6fb1851243cc2d401c57e4dcff77da8b435fd365a234c1d4618380fc70a4d3c40a6ce4a7e79c7688776892c82f46c565700093b2abd491a2d2233677b6e8c13c3827", 0xe2}, {&(0x7f0000001500)="ea1c68e68422723c3afb03b4ddd9536c2ae317b11704d4006527bd44d3f6e3c665512d2790d4811983c6601e8be63515d4ae5b52e3e2c8898453e6d6c09380025320", 0x42}, {&(0x7f0000001580)="5e73ae4593b4b921ae694a1bb26e9f89254904eb5eb8bdf0ff1d0aea088be56e46f0a293740e4f782586d9581fc20046a7fbc27fd224524b5048cdf3c8ed7b80a7273a6dd45dc4249156bbaf240c1d1f197b51cee315deb0ecc453fb", 0x5c}], 0x7, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2efd}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffff}}], 0x30}, 0x4811) r5 = openat$cgroup_type(r4, &(0x7f0000003a40), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000003ac0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000001b0000000c00018008000100", @ANYRES32=r6, @ANYBLOB="ee2ab497df8f4ada27d145917ef032736a3d7d998fe420be343c8057e7da7940828db5b2fc9402ec98525b3926dcd7bd08ad3837345428622b420954c75f14c4b597e326a096fe7a7f99c72d84f28e19b73e88a73d201b37df81512ebb7742eaec8d8d0478edd3"], 0x20}}, 0x0) r7 = fspick(r0, &(0x7f000000aac0)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000ac40)=[{{&(0x7f0000003c00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000040c0)=[{&(0x7f0000003c80)}, {&(0x7f0000003cc0)}, {&(0x7f0000003d00)="ecd905a8", 0x4}, {&(0x7f0000003d40)="405c83ac83418d0b9f782e45a2a685244eea3b5154ed1d0ad37f5b1533b52dea226e661773ad0ae4066142e12cc2ea09f98ea63ac62df716addbfdb65318ec8980c71f10d642940694364ebef20f60c9e6d21fbad49387ac82c86b7dc9c296cba1ee1fc7cef62c6454c873c52242b4cd8ca69ac1c9306c688f87ae7aafaef09bfa7b5f8627466241e80a44f6eee9f498e0348ba867a6c717e387f54a2ad314bf0a4f7e26653c70d3d2079c5b9d4fd0f5c7fcf205c338d3b7070ad4e97cf32701ec603db002f512bd62b4036ca2d2b75ddb420348caf0800337b00e9a88b65fa8c10f4bc706", 0xe5}, {&(0x7f0000003e40)="568d6503ebb6fcbbd7c03d3c2a2f0eaebf8f5cfaa7b17313164090cb23090668aad24e6ec7111af5f34886b22bab789388184dca0e28bc09332fb70ae10578f221aad177c03473930dd6e06d0b1d7d60e9177d40963857948facb7b14f2b779885eeab9e1c547cc2076a17cd0c3e1885e41fd534f2832637bb534fe0f22643de51c23ec4fbf8066a29faf933f5378198b98238e98bf0810cb97d", 0x9a}, {&(0x7f0000003f00)="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", 0xfa}, {&(0x7f0000004000)="126de1ff1b88f9fc6365ab75fa7b9a60b8a076f1b1dd542cf3b3e3fb2ba24907e9b23c55699a7a40cceddac1d831c01169056a563d1618a6cf71e2e7a13257b786041b1a7afb771253d8482766b48abfa8fce0baced2d80f22a55e2b4316f08b8a3cef7094f31669e2dc96c9c8a1c786e993c05c893fd9b70877092b66b321757c740ed55421117b09a9b80139b21122", 0x90}], 0x7, 0x0, 0x0, 0x801}}, {{&(0x7f0000004140)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000004580)=[{&(0x7f00000041c0)="6bf885413735b97ff6dae73eef05914a43143dee960b007ed25636621e98668f21b8c1bd8a9f3901bbb866048bd25c5ff6c13d114ed4cdba6509232e05a53d4145882dd2d04bdd72a09781daa4d90186a9470252c12f2498a6edbcf0ffb9fd1d8a5e60059f773cfa9d030a8a27521208cbee8a37cb00cb0f085fbe330c61d5f6f154db4eb94f74be7001f893840ff25c2bad348ed8576bca6ae851cb2d51eb7b3c9cb3337eaffbdfc9c93320326308a2971033fe0e37da314880ad2befcc854b9ff5b48601113443ebe1b7bb50f75db82354acc39181d6594d9a95", 0xdb}, {&(0x7f00000042c0)="9a6b8bb684f3afc7817c42dfe55e9844d182335a702aa79759bfa0615bd615771113e2d56c2b36bd54b23ec4435d5c91fd544cc74a47fe856bd0259facde93ffd8f6cb921e1c9ba27431c3bc6b66922877b1a11a4f945806", 0x58}, {&(0x7f0000004340)="e1ba915a18a7aaa8dddbe382ba05c6bea42d04a61620b5c34f0f54f1c78a57b21d773ba4e973392a4150a94f554b7e13314c171965aba82f885aa444fa81814d8c4d4c1a633ecddd326a0f96bf53ba3d421cddbe23fbe4903a0cd9601dc84f3618761a8b2ab4c16c5dc4923bb0c9e4f34d112a5b3fbecc7b5824ac2fe215a755c344ce80eb037f9448ee882b01ebbd2c7422f733d97ec2a0088f2fc7cdfe0f04c31277cdbafcc70e60", 0xa9}, {&(0x7f0000004400)="61f3b841efcdedb6f95cb58505b1fb05039fcaa3a9946f1e4140b23c012c483aca3cb7ebe4784c629fb4018477c883951899ea7c06650ae44524bdb0d60723fe06fd74fc8b53cd541074e6cc1fb33098a54b2c33fd6f7d89c7f58ed16b1af03ddcff37df53f31df860a7", 0x6a}, {&(0x7f0000004480)}, {&(0x7f00000044c0)="5fc8097620bf92e766f18bae4890478aaa468032995b66413534b64e682fe7b54fd31dd44a936baf80f4cc61f046e4437dfc3d39b490d91f77c3358e1b44b8e4637ab8c461702282fb64416cbe0ddc243e9068e6b7f31bf48cb05e086eaf85c2604970d2b03e11e4595c482bdc5dc4246cdcb3aa5f4d6c2093f3cf6d1e7fba88f611f31deaa72f5808d070", 0x8b}], 0x6, &(0x7f0000004700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x60, 0x40400c0}}, {{0x0, 0x0, &(0x7f0000005a00)=[{&(0x7f0000004780)="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", 0x1000}, {&(0x7f0000005780)="c82208eaf09edb13984bfd66", 0xc}, {&(0x7f00000057c0)="60900ee9e7ab411d80378a243a7b5455ecb946425aa13c2fa2277098f64bfa5a6e7153de23239f16daaf6cb99c64d3525b71b9b6d28e08e3fd0844b08b49442deff0ba5d1a4e136f929c4bd7f1a68c0f8a6e6d619a1b8dd530bbf73123", 0x5d}, {&(0x7f0000005840)="9203b7759a256d91f868b242c17cc3dc7d8bdab092cf8f94eceec18a3eaa6b3ac07711fd2d039ca60a60c74e193e2ff2294d36bf9e2a900f7d84d31da130b6e13bc06b4cc82ae80ab63c", 0x4a}, {&(0x7f00000058c0)="a98bd81692e68ecbe95622879315ddd76c9796b3a812ef2dab056b078a0cdd0e8e2c91a1fbf8401452783191726b53f74e6dd27f823e58e4ed832c46665008b3307c06927ab8f870ed514a2bccbf091da3a8091681b7cfe922e112", 0x5b}, {&(0x7f0000005940)="f79e", 0x2}, {&(0x7f0000005980)="d71a030fa66a6c3d33c7d7c6fef60834412ed318f961b52a7a8bcba666a268c50da645a2119df34fcac902cd9a635b7759343b84b43baa2191809365709b28b2ac7eb54115dcdec82e588ff5ba0e8d1d9889263ac8c46d7e5891a92a4248f4ce1f76144fb423d8126e7f80917fd0425e", 0x70}], 0x7, 0x0, 0x0, 0x800}}, {{&(0x7f0000005a80)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000006e40)=[{&(0x7f0000005b00)="ed065838b08cbdb3056b142b89c250286543f2bc6c75789a358f9399420a493df9011d2da65a689f7a2f28cdaa5bd83c19557a1322d2df2fc70527b409688446979630fde6ba6d2e9c230f9670d3a30bf2911c29d3289b6e62aa56a0483878f89cd01dae4b2c58776d49dfed951fc89cde011230820e2f7ec00fe8635cafe78f2c2c5443e1d83e2138ce819039ce064a7df2aa048d937189be683db3e1e8390e3f30fc07d4d1aad4efaeafbd95", 0xad}, {&(0x7f0000005bc0)="0ae37d02d1d90c67407b3d25755316bdb9dd7df9430af88843bb689ded57f95fffb87dc9710e6479d6decb81db05f30fa5c8299f753da2633f72543873533ab3c2db391df653229ed0b4393fdca800cd377cb74bac677eb1f21a02c3817a6ae24939dd4ade3d9c472272ccae46169881e45c751595adc00b9eec052ebfb09b41a5ab43dfaa6a37e52b55e0bb9c3af0c42bdbdfb9bd8e0da0a7d90254b7a60e8ea75ee5493b16ad967bd2e2aec101e2208fc5afbd5a890ad72fcef61ecb31422f3484657958d7056f0953d8abd6ec415030f4dfea9d1aa4e327d3fe160f621aee1a3809", 0xe3}, {&(0x7f0000005cc0)="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", 0x1000}, {&(0x7f0000006cc0)="820475d3014663eaf35b40c2e45557c9213d39433bd503f20307cf61bdfa244e047f7b85d1621fa266367dd62ea7d67239117346b100ca2e51bda30ef7f0e9f85bfcf4af10a8d18ba1d8ff06e7b3d0111b8570ab11b4fad87dedb3b14d21c0db28271cd978f7d725eb6c934c4dffd3c6f0421241eae86a859c39afad72059286b81c5fccb776bdce092ccfd490fa5cc4dd1f43379451e90f4e30ff183482fa00808a3daa52ab4dad4c564cab8f564e", 0xaf}, {&(0x7f0000006d80)="9e8b168c67889ac3922356f106283bfa6854751d351ba6d3a98f04e8d9b8b422514af841504ed54570859c6cb2b99a3499c17890f958cefdb17cc3ef6bddb6f2abfb4e3b6d0036686be877c1d14ec77075912c78bfacc443a7c7d9722cce65ae58e6669733b027a09ca4c0a480098898a3a0c2d31ac7ac7c5fba47b6b4e491e806625cff92bdf8d3466fc5e8696f24efc37aac3e43a1aa6bbbaf44bfd58fa1fcc119c0a467c58347cb88701ee8", 0xad}], 0x5, &(0x7f0000006f80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}], 0x20, 0x4000040}}, {{&(0x7f0000006fc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000008480)=[{&(0x7f0000007040)="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", 0x1000}, {&(0x7f0000008040)="b0edcd28147840", 0x7}, {&(0x7f0000008080)="2805d6aa7eb24978f1b69ae37487c3d6b71042f2e0e9f255e9fea1676d263dd4e80a726bfb9b66c8d7fcab60cc37101e68209cec91bd5a941c0ac5adc8fec35afedb3cfd7699ced8d3ccddb339539e4ceca28c25fa7dcf3ac44748f8177ba10e5bfe678f597b1a3e1a596c718ed7694a597d83f8b8e11c38ca589bc664fe732dad2322cba5d41c97786e536ff095d13f40a2ac30f08d4410799b3c5519995e51693e909b8cf2493301c44d105a19acf2afa071d74c09f5a6f146dec3f951272c85223f4ce7ead0040b0646e9684bc19a89b5b7b31acba9661afa4fcf10c109a7195ef6c64def", 0xe6}, {&(0x7f0000008180)="57ef2d6ebb8c617d32077ec1018174723b13997c6ce93556646e46eb4279991a18a743953b68c59ca8e4cd0bf69974171824a6fd72e9348434ef5fdbb09f2ea3ef3239c21adb3e0aa4d7e1b49fa387291c818c8b27d9c3e41a5590ccf545b1f0be490d8da809d2b8a0d7fd4f6d4c5ea16a084fada5ef78fae33ae95205613f4663c8ef45c2cad9fbaea9bfd41163c1ca2f22b1473ebdf0f438766d90718899c404c85642f3385e296167ddf6b1f09cd8ffe1d8334c97e07cf6514abb", 0xbc}, {&(0x7f0000008240)="db32a2853ce76c039659ce10b5c66b4e711b4fecc36cf86c5630d94674e73a79ba2a4f2dfa1f6ffaf83cb2ffa18cd6f0e058f8ca325ea6aac8e7524dbb204fc480fb17e945149fdf5dbe1b43bc8fd4a57e4e4230fa7f51f1a83bc25e97d6c4d2c5a545e78fdf9f4357f6d11ce75c70ce3a9f1dfe60feb3479401c35f7b224011fc8860796f080fdfc3902ce10c4dc45facf7f1fce5532a8eb3178936216c499d533ab355859975295207d34b977de212da053789", 0xb4}, {&(0x7f0000008300)="31d88e4b56b099e63d153c4d7cd7707ba6883dd51ad2445a4b3ee8cb36158396b3e36d19a55a3bd93bbd768feee9575d26109125072bea06a5a38ab19155064e363a665edd76c48ac368b6b31a2cd1998382091b4cc88a1f9bfc232bb900def6c801fde8288cd00585a7dd8cddc32db652e9da299228912005d256f1b42b6d4d1d1d1b0857d4be234f5f34c8e95f03", 0x8f}, {&(0x7f00000083c0)="751742db0030c95fbd503183a465081eee59a83606c3d669cb5e9d49a77201921a120e678c7cb518a3683f39b60c25669743b907b8617cd58088864a22983dfd4bb5de2b25895b0b4c57703b79", 0x4d}, {&(0x7f0000008440)="ba5779d1f8b180b79b2560b872b5a7c0ba954b38a2e1bcd867d32fc26ecfcb8dc04ebe8d1116fc2b8249ccc52f7c2cd9bd5c564c490dfd5539e24beec1a5", 0x3e}], 0x8, 0x0, 0x0, 0x40}}, {{&(0x7f0000008500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000009640)=[{&(0x7f0000008580)="fec302573f031b16c31a41416621f1fc709cf664ec973f395fd806d71163ae4bc3232c2d710560bf1b4a9466bdf26d5229ca66fec412717ccbb7f276abbdbd39ef91d0b5ca", 0x45}, {&(0x7f0000008600)="811daa8a5f47b904b02ae5099aad34a764cc777f84f8fe09c45afc4f", 0x1c}, {&(0x7f0000008640)="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", 0x1000}], 0x3, 0x0, 0x0, 0x810}}, {{&(0x7f0000009680)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000009940)=[{&(0x7f0000009700)="f795d38958f2425f2fe5f53e4e01878c2cb06654b9d7d45bdff294f50e03c208f036a841640beb52a044fe087e5aa8402d22844995e2f247e6db48e4ad120cb34c0ef5abbad51992615bdc4c788f8c3fe9509977cc76e2bb175ae4531a9a02ca8f82d06e8ec631b3fcd9cae480dfadcea36bb1ed442d7766b4f19bb67e5807215e2e9e37fdae772fa5a7da2ed2928f4f2b3d99658ad7d636efd466c57d0b8b6c75d99a6895ed51dc7fc22d7867413e2ef6c55554599f0df24957534c806986a7eb91162b44d7bc91fa2fc9ff1caf7bfe9e0ea2d0b3df89f75ff1b0887efe51a477183eebecfa7e1d5a0eac68859fd85f753f89b4eaa234c8", 0xf8}, {&(0x7f0000009800)="c58dfff6173669facc3d19ac62bea2aa0ea31521928b63ece349dfd4110f8efb9b0963a758", 0x25}, {&(0x7f0000009840)="881ce3b942c6bd7849a1ecc211", 0xd}, {&(0x7f0000009880)="dd48b6d165e54fb6f4d2fc4fc942e9bfe8b6f7723abd1276ea57059186bdb055cabad0bc82cb68a8651de3516746b329b4600700453a88c2dcaa782e37255e392771112e607731a7c8532df9a63652a5872d0cf4a0ba417086722b022ccb0cf46970bb8a00545dd0d5a965246b54f0ed2b0fb882ad75a41d19e294a4b990de5c8fee2de4fb4c57e113fb68a74034717e0a9e5f2a72ac153246a18c9ad17ebeeba4ddd81f719b31ad9b78a2c845e8c89e2a4ad12cdf3161e6f95bb18f90eb91", 0xbf}], 0x4, &(0x7f0000009980)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38, 0x22ab909f91e94790}}, {{&(0x7f00000099c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000009cc0)=[{&(0x7f0000009a40)="a40a02c91239251af3ec554a98a9d3e14251c3d66972e5e53246c1177115c1bce4bf1625ad91c33c9adf9d6dc0224d3629fe0bcdbef0818e0928d2f2a8adb777129d74d6ec8ee292e5ecc7d7506066ea3cd8", 0x52}, {&(0x7f0000009ac0)="108d33f4faae42a3fcb8b0f3c8d0a3ad543b1c21cf5fba4dd7d0f9cb2c84d3c0ada82de29ed44d085a79bba8a3a2158f6e87b20bfe35fea0facd76d3fbd673da510ce9394a0a4fcc1c5b2a9f05f63da39aadb637254c20e633dde7bc59bf8c3861de297a1935ef2538d7aa5568947096bab4496925a6292865d989d157a0983dcac00f0b3ca84099db1529cb7d38f1cb39aec1407333a58c9615e3830e490db578c45f45cc2c8134517692486c0d6699f621f4c510673b804d909c6ab80dcc5060101aea51fe8e74b4441440920f7f8b3fe8849214495d9275fb5d849da580d5f163b04360eeca292cb8", 0xea}, {&(0x7f0000009bc0)="acca49892d635127f2c07f0154aa8e9fde39d3f5b98c639b256a09edab35a5c94df0137d0b4d7a22e9779dd2caa832b16da3349e582a672635240748be774492266fadc798337f614a67eec6392010d02e2098d6b0eaff9f6710fdb9c2589adab6eecc886afb26f98686fff35e9aaa6d4d30a4377c2a57973ae50922a05ad395f92711bce27e5c9322d353324eb2af8c6008a883af66fe0acd7f79e472b2ce605ff50c57bb377f5782587c327969844b9aa54dacb505ace383a5d03bdd8781db2a2dc69bffa8d0e5f8a7f067e796d9c4729ce7f3a2a8620465a36a9df1ec948ee30c64e0e347beb6b9bc6dc21757626a1a7c2c0ce08afc4770fa", 0xfa}], 0x3, &(0x7f0000009d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20, 0x20000000}}, {{0x0, 0x0, &(0x7f0000009e40)=[{&(0x7f0000009d40)="d99f89a9dd7d085bc8fe791e3ad897861e8d4c942770c64008d96b468ce997931e9179240db261e990c8724e5acde7bd12a8a6b3a4cc722d6d72889321c8ff6cecb38c7511b313008e", 0x49}, {&(0x7f0000009dc0)="f5da39342cc87b39e2d1451b99c6", 0xe}, {&(0x7f0000009e00)="f4b45fece02af457a1a3d3bc248e24c29a18d25159543efb8be9efc182d0bcfcdfb94a19bd7eef6948cb2adc6b079a20f6", 0x31}], 0x3, &(0x7f000000ab00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r2, @ANYRES32, @ANYRES32=r4, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYBLOB="000000001c000000000005ea9ab3b1e19a6a0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r7, @ANYRES32=r3], 0x118, 0x20000000}}], 0x9, 0x20) ioctl$BTRFS_IOC_QUOTA_CTL(r5, 0xc0109428, &(0x7f0000003a80)={0x3, 0x6}) sendmsg$unix(r2, &(0x7f0000003a00)={&(0x7f00000016c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003980)=[{&(0x7f0000001740)="bb3c82314580da1560d9", 0xa}, {&(0x7f0000001780)="a899d9ea835dc8c6f3d8ae60276847800ca2dd87b0ba2b8bafdcc3469340e61b55a449cdab07155ac79e45f47d5e14ac9286b7aab89071d43e86fdfde19cc586815829fac5e5fe60695fc9a1fa5550e19b18cf201911931c17518d2b636b04664872ad0566b6988d9f9bef7ac35fa99ced4d0c43020f335a302ea7cf0eec34e48e87856c2c86fb75b15f816eebcd012b652ce1bd121d3c2ccde86c5035a3bbdf28195d1d6fe495bf9d1cacd1570751fd449d050f127f8c053924fccf1a94007ca8aa48a09cd753f1db1fc3ad2cfd96b7eaa4bdcf47acf2f905d3c60184232090aa1311aad6c03272ec7a658fa50be75022af89ef09fc7949968c51f031d46f5730ad966f0342780105526bd3a175f7c221ad9c82c6d500ec0f1a9ff41bd27fe11b383c22deecb165fa6062d5895f6e2738ac8825cd23e2a09e2672aa97b120e80d1607b31b5d6435deaa6aa4e57e124dfeeaebf12a0bab63d169f27b4ccfe6f2b4be4e47d701d3d0543f410e6e4d876d4ccc941f42a1b19b417c7542e7ed43c14e0451e1446836f19f04248a95733d620b1f5c0785b04c5c943c46b783c07c5d7e480ea946977022038d7bec5288c4f2c88477d1cbb4784a78beca151c72b9bf9ccec24f13fdde45c2292419da059c8c6117f03843304b614053444987851d59b8314cb892c67f164b50240ece77eb0d0c2aba38e443958f37100bbc4a5430f46e41c80541d8df8e27477916442ce7ca98fa3b0950f29d8a777027ba376f91119370da6d65c85630a6697383645c51c5a7e033279101117d745a15ea357cbd3a1ff81385656ab828635546504812d7ea9218d244364da2e410f40b441bcf18bbe7d7d46e4ff3d29e3c80ca1ae3944ff2949246ff01028d82ac1885d44f5469dd11959a402757fc783a8671f3a1fc9ad54805af0971b63c75779c0206275bf9bfbb341a22ec8411b5bb5ede400cd4a117754d6828bbdab3887390b9de5757ef0d65758ade87644118e568398d75c50ea70ca812c55f47580f7369f932060fe92b14e7831cbf3fa6fcc1c1c2301789b082869aee5ed6cef34cfeb7a15ab28a56142669482a1d790232ace3e162c39b5175917450db85cedd18b3231794aa45a88f74e09bd8e0a3e379aa3a1e54b7ce277cb55040221a57c15c046d6bf7a685ecfbd9b88a09e8c474fdf8daeabaf61dcce0e9a9e81d81deb34eb4b4457725b86907972987d586ae4ea8367cc8acba12913a6983599a4450dfe2b8db75e6ed63756b2bd0b424ecb26888e20fed0f34be7ba18a99bb676409f89a9fad3109a5c1e5a7ec50b8ca67d6eb1b20e141e7843aa8f7a9a626442e97e8e31faed92a0ff3c655d6c49440298eaa08c7b59f272cdfc43bd9fa95cc7f38ff83945baa207ab8875cab5d89562d9538f81397f48ea54471f44b71ee09cd0c9b3a39077846f093e62ecb954435f646f0f6da79a3f4e3777d1e999e3a14de96c37bf176f9fed47d5bed4354c364d963139f42d83df19947d20aa76519de082c0524ccef84a5d9d527e0ad0209d3e9996e0cad287b3a6e9292f82694f16f4d7d54ab0e0496340f27113b21b1af2af5616dda962ecb8aa30c820102d232d7c82438c5185e36ff1c4b2325ab43f1bf629b80864b2b5fda423e291c4c5ef84626fe30dce2f8f9238bf2f89b9a9e1e21d11c325befe5fd7a1b7cab77bfbe94ee1709bafc0f2b265cb79df590cf7e15753701352463eac8bdbe5fe65ae81cc39642b71057204d89ee7c95bdd5d1743abc247bb13a0a064e4b1c158dd0615a67fb0c6a0bb095159d1be99f042c296593da8ddec256991748841a92aa5c7c34bdff0fa9ce64879458fb4bd284e294237cc17820aea9e32a046ec4e3256796561922ac317287083b0a43008273e6f12a82d91dae29c6e58f1f9b2e8a57ae7a9c60e0a2dce66cc34e832ec4c5a6b8626fbe0fe94faf008ff0665ad0609ca3af728d34f8d27a21fdadc276cf4c9cf7e19dab137bac9de20036b2eecd43c8d876ec650b1723f784f3b723065f2f3a02d5d668e00b9afc28b6cdb3f04058d2e14582bba0ff856be610355c2232848442a046931b9d65b1f178d7d7e06e49d75e1429185ac517e3ee00d9d0b52134cb112b9c40b048aa3ff3660d5cbeacf736486f8ddb9fc51c1651e73b10f30c01bc79201a25ced2f8852b91d6fd21569297add350a9c27175c1e20472425878e0e881201174e78ebab1961926bb84db0f0e5edd29f0fcfa78a443048e4b7f264b3fd0c520ac47b8e529861efdcab0877177be58df334fe5b9e963ce5dd5102f15b82243bfd1572692d3c1e6674366a541e43f579c839da5adcba17789ee3bd82b4ee0f773d766980c71bdf93a9f5bbda156435cfb7cb34080d06ad184db8cc3f52475da80bf4ea58530a4ad6ef19298f1286196c746b55d5f460a2c4d01c2175194f493f4adb0026d5f0115dbbf002eb5868615d31e5c3fd52bc950afd7f42b916e83a205e97bf6469d2f1a60b313f44a51177023e367ae788722ec6031e8b0a493d0e68eaeadbbf7770536e5b62b6fb8797c37b4093cd88df59457b733b4bf4c22662be9c5e1c3a79a25cccd3001b85e3bd09de4a7b69e9f11d1e3a315371a98e5e0d217e51477acb2ae4a53d96894b41ba12b2d1cb9b1c495bf9bbc19b34f8c9ea023ecbac12da70f827a17e2f0a3d971355600bfe001f5f75a553f628e382a247863d35efcbe5356aecc7bf8b21efd93e536119683980b937af9037e9fde3088476dded49a616947b5f9f1200a161aa49e113b60622b8cf2f3f3309db6583faa8ad055d62f050d60d6fa93a7d223b4f443672028a5837d8e5dafd7518f4ccaad6824c0e79908dcb82bff039da537f46ae56f0811009fedca90e63d6612432e4d27eed903ee01aba13eef9f5071418386d953a12fae3227de873a9307e8b0f3fa1ac3cbd0a6a2897e6d6c2f98a2fd96ab369044438bf9a6959afe9c835235836f676dde94f061dd9378df4061c12f50e0556daeb6ab318dfd9ae95a46e66a512e3cbb50fbeeb236f0279598de6f46e73971f1cdae2c37ef8914f5bd6f5ad18b5b9247cbe84d9bb28c108011c33e9e468901a154cf597462975b3c18fa1ffd5ece5905e3584e69c291b277c3b4061155eee127a12eb9534acd1613cf024f1fcf3de75de39387f5fe4dd85b369743f83c7e012754f27bddd1aed75fe8cf7ffe7294ecb73e87c1b2f53a87984e330e31a20d0a63a073271ad8468ab0db8f609a5b6945662f56b686cf9278ffd8d0fe046b8fe4ee348e614e48b5ce8bf16268c2d57719cd0052321b9229f463fa93369e367a10ede2270f7ccd53cf1d4323c3346c1a4d3c79c039d196d6affab2af789d869ae08b50454369e9ff7fd810291266c321c6e31c5c72a3a993347f9f85b69ee4cd66f1c48dd47ba7cb47dfc94d9dbb684e655ab6af71d3d11556e226be28b80c5bf876ef8186edac8470b39648ded784265b19876847062710e1af16808ed319fffa86219c0a13fe812d6f90770392aff612cde1625c6163cd482df5bfa529910494e81dc3947dec59a217bec5cf6d1cb4e2d58651b0cf347f7a52579aed7d9257cbfe4dc21fcc466f348b17ee113fb9ea7be8373bd591618e407cd1e5a57b3efa7b81c791824278c385a99c8f283daef66039c464946eae1eb06132c3861cb719df3af6a6d5afaaf0d8cbb489df014b9e9ed0d57b30eb34f952d2bae85bb79e528a554d795f279c27bced61c4f3a6eaad89b98e3f47ee0a27ee1f29826a96ed9c756813ca8f998231cec8878836aa99fe9132c16b2f5dfa153776776b4a34679fdeaa9d42a818696c14f26678f3ac2874c8d70bdfe364802564b11557782eb7d9940ad0339ad504c2fa3bf5fdebe00255ba4b82104f41032617c64e00bdebcc20e7df7b0d9a4beb78c2059d50903184234c5fd06a5e4709fcdab3dbfc6316f61e5636a4e0c512678fbc924d77984c4ceb5daf579c2be15df9e7f73f1dff672e9a111d16f18e205e78a10f7f200575b826585e144f878090501ebc40e08764bcb01eb42c4041661c857e9930b2c2f9b1a3d01dc1b759caea328927ffc3ba820f55013f44fc950932bfaa2e621b83b721e4b8baac03002fb9142795bd5fc95e36cf9bbd48f08e90a3d9b2df829144400e076a76ba45e621c27694c85bbd266c24a9ec735ad0e7fdb1c9327a9a3b9fb74fb4db576ad7133fee1967c6a2de157a4608ff191d4e48cc6300fe75da27be3c507ebdb06642d6436839419ac1ac9bcfad69467fd8568bf60c4a05e013ecbc2639327b9e8eede06b61415be8c3c5099d8c7d9a3be157580bcb7aaf70fcb9d3e83c5237de9fece6ed23483fd213dc4ab14b46727e4c61af2a628b69786f43b0af5d4068f2807252f2eda6a597ce254a967a4d0e7522a8cc73d93368dc810f4da4199f85a505dc1075e597d8d6331e3054507ca11de0e1849f3a1ebda0151002746c8a3e397a198ef797723b7b140896c2b19d65804c2e4678f23fbdc424e69d775596086022dd5e3caf543ae5a309aefc59ed41601d8ff490129b4148513bbe720bc37ac1ef8abc1cf7039ced62f5f33e09d90a28d1cafeaf67ab07c88b9585ff28d0c28e58653d53f4521f27f745bdacd9c6e6d07bf6dc58743601c822f75635ce3f9b07eb08b4850b43c17c4c5e2123c618dc18e036064ad77634c160b77132115555a51ac4bbd831302bc5c875e88bc1d15d071139c2ebaf1d8334cfffbc4d070691f48f9ba2b2507951b7782d2f7ccf451fe4ff1abe3e6aafab42e85f56cfbac6acdfe081efd66fb4e744d9e52644c270d52a85cbef7705a12a254dcc6a7c40ad2bf8b90bc2e1992116fdbe1577300f7da7552a093aec6f3981bb9b197d4fe80afc79cfd3afd6c911fbfda4ac4a5a27744a35a063437bc22ded6b9865025f9f290a03187659dec39bc2400b0cbdcdc70d02bebd8594eedca132fe08e5ad1522c293b72cd1f9b8c38e40c42855f4bbcec48e0a7ee6f5e02da631a2b93c86ccb3433ca11562189ecf08ff5d8549647bdebab3f6d8d206654f3dbe5cb8eb1670d8a17047f0f476f4633f3dd7a07531b83b116e72f463911ed82fa606ec86b139097f82c44ae87c2a24f1b745e16bcf6ab64d866a4b1a91aefc555a65a3355468ae4ae3add2e0852080c6986f08f2fde34c54018e36388dbb501f24e3fdaccd6297fa4f75166cb913bf44743e01987eb6c2b22c775a6836256d029a86416ec4d570776f27c77dfb279215d150e0e6aff79cf7801f219b46890931ed7c0df25064f9ac195011b1d928129a042189c8ba53db4146ebe49c1693fd803cd8510d802a5805467dd84c7c2c61171c46069ea85eb28742dfe6724aebf7815265aac6cc4a52d724b0e7dc23a435678cd4ab6738dfb9f4a45a300af32a3a1151509944bb6f3f587ba28194effd69eb2b2151ab291f49e3ca4111efa3dda06a07c96d26755a89fd9fc7d731b78570f8579e4baa338afff04ffdba2641f16125b9da3c38a09da95255717200a09cf2bed2a6c4c4581a818a63c4e4d82a5d96b487f8267a240f38a2fa1c53f111beec7be4ec59e6388f34f40260aed85769304379443dbee685bc54a7bb12fc1a869fbeb913b370ea931a8f5c6f4186bb66d73e58bab036b56abd49d661a11172b63df075c661333613d4cfd79f1c0128deca3cc052edf445fa00073a00f6a77eb0b5137efaedc93e8fa7ff5a71861238ec66e2d3b85f83ed9069af0011b3954913fcf27ef711f520f4be9d0cc5142a57e5d122d3243aaec6d808c4f8", 0x1000}, {&(0x7f0000002780)="e9b6c6fd525c5c5611837d421739271582cb9f9be93306fec04ce2dd9af7130aa7676ce12f301e61e1441e17071daecc12e42ca29a11dbd176e6ce3c916560d2c510f960823f23a0b37f585c492d447965efdab01a8a92da3531bcf1d254b85acd8e9cd38b286e58335f20a614ef7fe410eaee9281d1730b1f420eb6b84c492b037b5ae8885aaf0d289d", 0x8a}, {&(0x7f0000002840)="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", 0x1000}, {&(0x7f0000003840)="2670b7b0909885a1c6a608ef2c21ae3818c403fcbbacd9a17a04aac4af776ceb9a31f1c6afd7c3fcb128026b19ff81d577209a1dd1a8de1179a564256e56604de2ca93d4fde36fcd6294c269c9e40e08292f7f2837057d78d49cc98516830ee1ccce8fb08bd516d6511baa01be6623b37107f4a9d05505111cfdb50c94a985b2280a15654aa06f41cfa1650164d57ee94faefb68d5f0de8a9ee5339016d6f16d7cc13752af57a43f76587d2f43d45e590b142d698a6c552e7075c6ce3e57ecf032ae38d1ff0cc6acd81c93f373914dde", 0xd0}, {&(0x7f0000003940)="3bbfe1b125f0866a2061f85acffc4b2628ed88226f212a06abbd55d8b4e6a5c7b06a3dcbbcae6917fbd8132f1e36bc48a20a7caaa0ecdc522b28", 0x3a}], 0x6, 0x0, 0x0, 0x20000040}, 0x40c0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x3fd, 0xb88}, 0x14) sendfile(r1, r0, 0x0, 0x413) [ 158.614864][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 158.626595][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 158.632791][ T22] audit: type=1400 audit(1635499169.258:368): avc: denied { create } for pid=22224 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 158.656673][ T4660] loop0: p2 < > p4 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 158.660943][ T4660] loop0: p2 size 2 extends beyond EOD, truncated [ 158.661468][T22223] tmpfs: Unknown parameter 'hash' [ 158.690025][T22220] loop1: p2 < > p4 [ 158.698508][ T4660] loop0: p4 size 2097152 extends beyond EOD, truncated [ 158.709010][T22223] tmpfs: Unknown parameter 'hash' 09:19:29 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xd4fa3fe959b9ad8}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r4) fdatasync(r0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x100000, r4, 0x9}) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000000)={0x81, 0x3, 0x76, 0x3, 0x20}) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 09:19:29 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7b01000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:29 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af540a1400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 158.718576][T22220] loop1: p4 size 2097152 extends beyond EOD, truncated [ 158.726933][T22219] loop0: p2 < > p4 [ 158.739074][T22219] loop0: p2 size 2 extends beyond EOD, truncated [ 158.751429][T22219] loop0: p4 size 2097152 extends beyond EOD, truncated [ 158.756827][T22332] loop3: detected capacity change from 0 to 264192 09:19:29 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7b01000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 158.792703][T22334] tmpfs: Unknown parameter 'hash' [ 158.798891][T22332] loop3: p2 < > p4 [ 158.803394][T22332] loop3: p4 size 2097152 extends beyond EOD, truncated [ 158.820816][T22437] loop0: detected capacity change from 0 to 1 [ 158.823276][T22438] loop1: detected capacity change from 0 to 264192 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 158.838336][T22334] tmpfs: Unknown parameter 'hash' 09:19:29 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7fffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x7a00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x26, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:29 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x80ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 158.869179][T22438] loop1: p2 < > p4 [ 158.873335][T22437] loop0: p2 < > p4 [ 158.873703][T22438] loop1: p4 size 2097152 extends beyond EOD, truncated [ 158.877574][T22437] loop0: p2 size 2 extends beyond EOD, truncated [ 158.894456][T22437] loop0: p4 size 2097152 extends beyond EOD, truncated [ 158.907954][T22442] tmpfs: Unknown parameter 'hash' 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 158.941708][T22446] loop4: detected capacity change from 0 to 264192 [ 158.951582][T22448] loop3: detected capacity change from 0 to 264192 [ 158.966905][T22450] loop1: detected capacity change from 0 to 264192 [ 158.974241][ T380] loop4: p2 < > p4 [ 158.979049][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6d, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 158.980179][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 158.987090][T22452] tmpfs: Unknown parameter 'hash' [ 158.996663][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 159.001154][ T7097] loop3: p2 < > p4 [ 159.017417][ T7097] loop3: p4 size 2097152 extends beyond EOD, truncated [ 159.025313][T22446] loop4: p2 < > p4 [ 159.031131][T22448] loop3: p2 < > p4 09:19:29 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af540b1400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x80ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xec, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 159.035823][T22448] loop3: p4 size 2097152 extends beyond EOD, truncated [ 159.038609][T22450] loop1: p2 < > p4 [ 159.045987][T22446] loop4: p4 size 2097152 extends beyond EOD, truncated [ 159.047290][T22450] loop1: p4 size 2097152 extends beyond EOD, truncated [ 159.075570][T22456] loop0: detected capacity change from 0 to 1 09:19:29 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x81ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x81ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 159.129073][ T5609] loop0: p2 < > p4 [ 159.133033][ T5609] loop0: p2 size 2 extends beyond EOD, truncated [ 159.140277][T22460] tmpfs: Unknown parameter 'hash' [ 159.157062][ T5609] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.167481][T22456] loop0: p2 < > p4 [ 159.171544][T22456] loop0: p2 size 2 extends beyond EOD, truncated 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 159.182499][T22460] tmpfs: Unknown parameter 'hash' [ 159.188470][T22456] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.190215][T22465] loop1: detected capacity change from 0 to 264192 [ 159.196305][T22466] loop3: detected capacity change from 0 to 264192 09:19:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xee, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:29 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x82ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af540c1400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 159.230037][T22465] loop1: p2 < > p4 [ 159.239070][T22468] tmpfs: Unknown parameter 'hash' [ 159.244416][T22465] loop1: p4 size 2097152 extends beyond EOD, truncated [ 159.251568][T22466] loop3: p2 < > p4 [ 159.257585][T22466] loop3: p4 size 2097152 extends beyond EOD, truncated [ 159.275164][T22468] tmpfs: Unknown parameter 'hash' 09:19:29 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x82ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 159.328079][T22472] loop0: detected capacity change from 0 to 1 [ 159.347849][T22474] tmpfs: Unknown parameter 'hash' [ 159.360562][ T380] loop0: p2 < > p4 [ 159.365016][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 159.369002][T22478] loop3: detected capacity change from 0 to 264192 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xef, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 159.378240][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.378412][T22476] loop1: detected capacity change from 0 to 264192 [ 159.394208][T22472] loop0: p2 < > p4 [ 159.398431][T22472] loop0: p2 size 2 extends beyond EOD, truncated [ 159.408544][T22472] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.419915][T22474] tmpfs: Unknown parameter 'hash' 09:19:30 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af540d1400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 159.420997][ T380] loop0: p2 < > p4 [ 159.432210][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 159.438807][T22476] loop1: p2 < > p4 [ 159.439393][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.442825][T22478] loop3: p2 < > p4 [ 159.454022][T22476] loop1: p4 size 2097152 extends beyond EOD, truncated [ 159.464922][T22478] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf2, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 159.486982][T22482] tmpfs: Unknown parameter 'hash' 09:19:30 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x85ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x85ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 159.516220][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 159.536957][T22484] loop0: detected capacity change from 0 to 1 [ 159.559925][T22488] loop1: detected capacity change from 0 to 264192 [ 159.590144][T22492] loop3: detected capacity change from 0 to 264192 [ 159.608693][T22491] tmpfs: Unknown parameter 'hash' [ 159.628785][ T4660] loop1: p2 < > p4 [ 159.628851][T22492] loop3: p2 < > p4 [ 159.632885][T22484] loop0: p2 < > p4 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x124, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 159.636900][T22492] loop3: p4 size 2097152 extends beyond EOD, truncated [ 159.640700][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 159.654975][T22491] tmpfs: Unknown parameter 'hash' [ 159.675202][T22484] loop0: p2 size 2 extends beyond EOD, truncated 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:30 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x8900000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 159.699485][T22488] loop1: p2 < > p4 [ 159.711695][T22488] loop1: p4 size 2097152 extends beyond EOD, truncated [ 159.714058][T22484] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.742422][T22496] tmpfs: Unknown parameter 'hash' 09:19:30 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x8900000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2da, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:30 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af540e1400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 159.773151][T22498] loop3: detected capacity change from 0 to 264192 [ 159.781163][T22496] tmpfs: Unknown parameter 'hash' [ 159.799780][T22500] loop1: detected capacity change from 0 to 264192 [ 159.841674][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 159.852368][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 159.853139][T22506] loop0: detected capacity change from 0 to 1 [ 159.868820][T22498] loop3: p2 < > p4 [ 159.874128][T22504] tmpfs: Unknown parameter 'hash' [ 159.874238][T22498] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x30d, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 159.899080][T22504] tmpfs: Unknown parameter 'hash' [ 159.904419][T22500] loop1: p2 < > p4 [ 159.913438][T22500] loop1: p4 size 2097152 extends beyond EOD, truncated [ 159.939013][ T4668] loop0: p2 < > p4 09:19:30 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x8cffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:30 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x8cffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 159.943474][ T4668] loop0: p2 size 2 extends beyond EOD, truncated [ 159.967480][ T4668] loop0: p4 size 2097152 extends beyond EOD, truncated [ 159.984554][T22512] tmpfs: Unknown parameter 'hash' [ 159.988439][T22511] loop3: detected capacity change from 0 to 264192 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x310, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 159.999633][ T380] loop0: p2 < > p4 [ 160.005735][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 160.014743][T22512] tmpfs: Unknown parameter 'hash' [ 160.028701][T22514] loop1: detected capacity change from 0 to 264192 [ 160.038548][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 160.038704][T22511] loop3: p2 < > p4 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 160.058837][T22514] loop1: p2 < > p4 [ 160.063542][T22511] loop3: p4 size 2097152 extends beyond EOD, truncated [ 160.065341][T22514] loop1: p4 size 2097152 extends beyond EOD, truncated [ 160.085813][T22506] loop0: p2 < > p4 [ 160.091871][T22506] loop0: p2 size 2 extends beyond EOD, truncated [ 160.102028][T22518] tmpfs: Unknown parameter 'hash' 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x311, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 160.105875][T22506] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:30 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x97ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x97ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.129975][T22518] tmpfs: Unknown parameter 'hash' 09:19:30 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54101400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x313, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 160.180897][T22522] loop1: detected capacity change from 0 to 264192 [ 160.203568][T22524] loop3: detected capacity change from 0 to 264192 [ 160.215996][T22528] tmpfs: Unknown parameter 'hash' [ 160.216018][T22526] loop0: detected capacity change from 0 to 1 09:19:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 160.249084][T22528] tmpfs: Unknown parameter 'hash' [ 160.256550][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 160.278960][T22524] loop3: p2 < > p4 [ 160.279016][ T380] loop1: p2 < > p4 [ 160.285222][T22524] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:31 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x9800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.294228][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 160.301322][T22526] loop0: p2 < > p4 [ 160.305278][T22526] loop0: p2 size 2 extends beyond EOD, truncated [ 160.322052][T22522] loop1: p2 < > p4 [ 160.333853][T22522] loop1: p4 size 2097152 extends beyond EOD, truncated [ 160.335054][T22526] loop0: p4 size 2097152 extends beyond EOD, truncated [ 160.372002][T22534] tmpfs: Unknown parameter 'hash' 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd03, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:31 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54111400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.393618][T22536] loop3: detected capacity change from 0 to 264192 [ 160.401329][T22534] tmpfs: Unknown parameter 'hash' 09:19:31 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x9800000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 160.448664][T22536] loop3: p2 < > p4 [ 160.453218][T22536] loop3: p4 size 2097152 extends beyond EOD, truncated [ 160.477377][T22540] loop0: detected capacity change from 0 to 1 [ 160.478006][T22542] tmpfs: Unknown parameter 'hash' [ 160.488715][ T380] loop3: p2 < > p4 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:31 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa101000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.493488][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 160.505809][T22544] loop1: detected capacity change from 0 to 264192 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 160.542484][T22546] tmpfs: Unknown parameter 'hash' [ 160.549080][T22544] loop1: p2 < > p4 [ 160.553473][T22540] loop0: p2 < > p4 [ 160.557371][T22540] loop0: p2 size 2 extends beyond EOD, truncated [ 160.563951][T22544] loop1: p4 size 2097152 extends beyond EOD, truncated [ 160.566669][T22540] loop0: p4 size 2097152 extends beyond EOD, truncated [ 160.583160][T22550] loop3: detected capacity change from 0 to 264192 [ 160.601551][ T380] loop0: p2 < > p4 [ 160.605442][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 160.613712][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 160.632142][T22552] tmpfs: Unknown parameter 'hash' [ 160.638722][T22550] loop3: p2 < > p4 09:19:31 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54121400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:31 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa101000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.648928][T22550] loop3: p4 size 2097152 extends beyond EOD, truncated [ 160.675749][T22554] loop0: detected capacity change from 0 to 1 [ 160.681722][T22557] loop1: detected capacity change from 0 to 264192 [ 160.689228][T22552] tmpfs: Unknown parameter 'hash' [ 160.695025][ T380] loop3: p2 < > p4 [ 160.699439][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1103, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:31 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa1ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.728695][T22557] loop1: p2 < > p4 [ 160.733098][ T380] loop0: p2 < > p4 [ 160.737340][T22557] loop1: p4 size 2097152 extends beyond EOD, truncated [ 160.739402][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 160.764996][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:31 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa1ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.777796][T22560] tmpfs: Unknown parameter 'hash' [ 160.787924][T22554] loop0: p2 < > p4 [ 160.792529][T22554] loop0: p2 size 2 extends beyond EOD, truncated [ 160.802204][T22560] tmpfs: Unknown parameter 'hash' [ 160.807495][T22564] loop3: detected capacity change from 0 to 264192 [ 160.814714][T22554] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 160.836324][ T380] loop0: p2 < > p4 [ 160.840306][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 160.853344][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 160.853899][T22568] loop1: detected capacity change from 0 to 264192 [ 160.869484][T22564] loop3: p2 < > p4 09:19:31 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54211400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1303, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 160.880644][T22564] loop3: p4 size 2097152 extends beyond EOD, truncated [ 160.897847][T22570] tmpfs: Unknown parameter 'hash' [ 160.908710][T22568] loop1: p2 < > p4 [ 160.912991][T22568] loop1: p4 size 2097152 extends beyond EOD, truncated [ 160.921030][T22570] tmpfs: Unknown parameter 'hash' 09:19:31 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa5ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 160.943937][T22572] loop0: detected capacity change from 0 to 1 [ 160.982251][T22577] tmpfs: Unknown parameter 'hash' 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1800, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:31 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa5ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 160.988705][T22578] loop3: detected capacity change from 0 to 264192 [ 160.998795][ T380] loop0: p2 < > p4 [ 161.002786][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 161.023083][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 161.030446][T22578] loop3: p2 < > p4 [ 161.034974][T22578] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 161.047583][T22582] loop1: detected capacity change from 0 to 264192 [ 161.067242][T22572] loop0: p2 < > p4 [ 161.071220][T22572] loop0: p2 size 2 extends beyond EOD, truncated [ 161.079744][T22584] tmpfs: Unknown parameter 'hash' [ 161.089693][T22572] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:31 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031500000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa6ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 161.108910][T22582] loop1: p2 < > p4 [ 161.116177][T22582] loop1: p4 size 2097152 extends beyond EOD, truncated [ 161.124242][T22584] tmpfs: Unknown parameter 'hash' 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:31 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa6ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 161.152211][T22588] loop3: detected capacity change from 0 to 264192 [ 161.154836][T22590] loop0: detected capacity change from 0 to 1 [ 161.178686][ T380] loop3: p2 < > p4 [ 161.183750][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 161.193575][T22592] tmpfs: Unknown parameter 'hash' [ 161.204959][T22594] loop1: detected capacity change from 0 to 264192 [ 161.214808][ T380] loop3: p2 < > p4 [ 161.219119][T22590] loop0: p2 < > p4 [ 161.223294][T22592] tmpfs: Unknown parameter 'hash' [ 161.228590][T22590] loop0: p2 size 2 extends beyond EOD, truncated [ 161.238384][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 161.248679][T22594] loop1: p2 < > p4 09:19:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xde18000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 161.253634][T22590] loop0: p4 size 2097152 extends beyond EOD, truncated [ 161.255027][T22594] loop1: p4 size 2097152 extends beyond EOD, truncated [ 161.268843][T22588] loop3: p2 < > p4 [ 161.273937][T22588] loop3: p4 size 2097152 extends beyond EOD, truncated [ 161.299935][T22598] tmpfs: Unknown parameter 'hash' 09:19:31 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031402000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2401, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 161.319509][T22598] tmpfs: Unknown parameter 'hash' 09:19:32 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xa9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 161.393897][T22604] loop0: detected capacity change from 0 to 1 [ 161.397840][T22606] loop3: detected capacity change from 0 to 264192 [ 161.406952][T22602] loop1: detected capacity change from 0 to 264192 [ 161.414198][T22604] loop0: p1 < > p2 < > p4 [ 161.418647][T22604] loop0: partition table partially beyond EOD, truncated [ 161.427079][T22604] loop0: p1 start 335762607 is beyond EOD, truncated [ 161.433795][T22604] loop0: p2 size 2 extends beyond EOD, truncated 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2600, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 161.440910][T22604] loop0: p4 size 2097152 extends beyond EOD, truncated [ 161.451255][T22608] tmpfs: Unknown parameter 'hash' [ 161.457597][ T380] loop0: p1 < > p2 < > p4 [ 161.462153][ T380] loop0: partition table partially beyond EOD, truncated [ 161.468848][T22602] loop1: p2 < > p4 [ 161.474179][T22606] loop3: p2 < > p4 [ 161.478275][T22608] tmpfs: Unknown parameter 'hash' [ 161.481394][ T380] loop0: p1 start 335762607 is beyond EOD, truncated 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 161.485897][T22602] loop1: p4 size 2097152 extends beyond EOD, truncated [ 161.490064][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 161.503557][T22606] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:32 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031403000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:32 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xbe00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xab7f000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 161.536961][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 161.545555][T22612] tmpfs: Unknown parameter 'hash' [ 161.569623][T22612] tmpfs: Unknown parameter 'hash' 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 161.618034][T22617] loop1: detected capacity change from 0 to 264192 [ 161.620643][T22619] loop0: detected capacity change from 0 to 1 [ 161.633379][T22618] loop3: detected capacity change from 0 to 264192 [ 161.669739][T22622] tmpfs: Unknown parameter 'hash' [ 161.679456][ T380] loop0: p1 < > p2 < > p4 [ 161.683894][ T380] loop0: partition table partially beyond EOD, truncated [ 161.699354][T22622] tmpfs: Unknown parameter 'hash' [ 161.707758][ T380] loop0: p1 start 335762607 is beyond EOD, truncated 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 161.714490][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 161.723293][T22617] loop1: p2 < > p4 [ 161.741145][T22618] loop3: p2 < > p4 [ 161.747456][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 161.748673][T22617] loop1: p4 size 2097152 extends beyond EOD, truncated [ 161.761618][T22618] loop3: p4 size 2097152 extends beyond EOD, truncated [ 161.771332][T22619] loop0: p1 < > p2 < > p4 [ 161.775749][T22619] loop0: partition table partially beyond EOD, truncated [ 161.796090][T22619] loop0: p1 start 335762607 is beyond EOD, truncated [ 161.802964][T22619] loop0: p2 size 2 extends beyond EOD, truncated [ 161.813844][T22626] tmpfs: Unknown parameter 'hash' 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6d00, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:32 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xbfffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xbfffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 161.839932][T22626] tmpfs: Unknown parameter 'hash' [ 161.848949][T22619] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 161.895373][T22632] loop3: detected capacity change from 0 to 264192 [ 161.912488][T22631] loop1: detected capacity change from 0 to 264192 [ 161.932874][T22634] tmpfs: Unknown parameter 'hash' [ 161.938755][T22632] loop3: p2 < > p4 09:19:32 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031404000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xda02, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 161.948488][T22632] loop3: p4 size 2097152 extends beyond EOD, truncated [ 161.977280][T22638] loop0: detected capacity change from 0 to 1 [ 161.991971][T22634] tmpfs: Unknown parameter 'hash' 09:19:32 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 161.998415][T22631] loop1: p2 < > p4 [ 162.011196][T22631] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xec00, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 162.045444][T22640] loop3: detected capacity change from 0 to 264192 [ 162.057590][T22638] loop0: p1 < > p2 < > p4 [ 162.062075][T22638] loop0: partition table partially beyond EOD, truncated [ 162.074933][T22642] tmpfs: Unknown parameter 'hash' 09:19:32 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xc9ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 162.090697][T22638] loop0: p1 start 335762607 is beyond EOD, truncated [ 162.097408][T22638] loop0: p2 size 2 extends beyond EOD, truncated [ 162.118875][T22646] loop1: detected capacity change from 0 to 264192 [ 162.129061][T22638] loop0: p4 size 2097152 extends beyond EOD, [ 162.129071][T22640] loop3: p2 < > p4 [ 162.129468][T22640] loop3: p4 size 2097152 extends beyond EOD, [ 162.135245][T22638] truncated [ 162.148207][T22640] truncated [ 162.152305][ T380] loop0: p1 < > p2 < > p4 [ 162.156786][ T380] loop0: partition table partially beyond EOD, truncated [ 162.165822][T22642] tmpfs: Unknown parameter 'hash' [ 162.171026][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 162.177723][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 162.184595][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:32 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031405000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:32 executing program 4: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000005e900)={0x0, 0x0, "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", "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"}) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r7}, {r6}, {r6}, {r6}, {}, {}, {0x0, r7}, {}, {r6, r7}, {0x0, r7}, {}, {}, {0x0, r7}, {}, {r6, r7}, {}, {}, {}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {r6}, {0x0, r7}, {r5}, {}, {}, {}, {}, {}, {r5}, {}, {}, {0x0, r7}, {r6, r7}, {}, {r5, r7}, {}, {0x0, r7}, {r6}, {}, {}, {r6}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {}, {r5, r7}, {}, {}, {}, {}, {0x0, r7}, {}, {r6}, {}, {}, {r6}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r7}, {r5, r7}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {r6}, {r5, r7}, {}, {}, {r6, r7}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {r5}, {}, {}, {0x0, r7}, {r5, r7}, {0x0, r7}, {r6, r7}, {0x0, r7}, {}, {}, {r5}, {r5}, {0x0, r7}, {}, {r5}, {0x0, r7}, {}, {}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {r6, r7}, {}, {0x0, r7}, {}, {}, {}, {r5, r7}, {r6, r7}, {0x0, r7}, {}, {}, {r6}, {}, {0x0, r7}, {}, {}, {r6, r7}, {r5}, {0x0, r7}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {r6}, {0x0, r7}, {r6}, {}, {}, {}, {}, {}, {r5, r7}, {r6}, {}, {0x0, r7}, {}, {r6}, {0x0, r7}, {}, {}, {}, {}, {}, {r5, r7}, {r6}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {r5}, {}, {}, {}, {}, {}, {r6}, {r5}, {}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {r6}, {0x0, r7}, {}, {r6, r7}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {r5}, {}, {r6}, {}, {}, {r6}, {0x0, r7}, {}, {r5, r7}, {}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {r5}, {}, {r5}, {r6}, {}, {}, {}, {r5, r7}, {}, {}, {r6}, {r5, r7}, {}, {}, {}, {r6}, {}, {r5}, {0x0, r7}, {r6, r7}, {}, {}, {}, {}, {}, {r5}], 0x0, "2156816c73038c"}) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r12}, {r11}, {r11}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {0x0, r12}, {}, {r11, r12}, {}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {}, {}, {}, {}, {r10}, {}, {}, {0x0, r12}, {r11, r12}, {}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {}, {r11}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10, r12}, {}, {}, {}, {}, {0x0, r12}, {}, {r11}, {}, {}, {r11}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r10, r12}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {}, {}, {r11, r12}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {r10}, {}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {}, {r10}, {r10}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {0x0, r12}, {}, {}, {}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {}, {r11}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {r11}, {0x0, r12}, {r11}, {}, {}, {}, {}, {}, {r10, r12}, {r11}, {}, {0x0, r12}, {}, {r11}, {0x0, r12}, {}, {}, {}, {}, {}, {r10, r12}, {r11}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {r10}, {}, {}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {r11}, {0x0, r12}, {}, {r11, r12}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {r11}, {}, {}, {r11}, {0x0, r12}, {}, {r10, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {}, {}, {r10, r12}, {}, {}, {r11}, {r10, r12}, {}, {}, {}, {r11}, {}, {r10}, {0x0, r12}, {r11, r12}, {}, {}, {}, {}, {}, {r10}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f900)={0x600000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {0x0, r2}, {}, {}, {0x0, r7}, {r11}], 0x21, "598a9b28761ea1"}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) writev(r13, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000200)='\t', 0x1}], 0x22) 09:19:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:32 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe003000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 162.199047][T22646] loop1: p2 < > p4 [ 162.204433][T22646] loop1: p4 size 2097152 extends beyond EOD, truncated [ 162.239537][ C1] sd 0:0:1:0: tag#6416 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 162.249397][ C1] sd 0:0:1:0: tag#6416 CDB: opcode=0xe5 (vendor) [ 162.255724][ C1] sd 0:0:1:0: tag#6416 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 162.262353][T22655] loop3: detected capacity change from 0 to 264192 [ 162.264775][ C1] sd 0:0:1:0: tag#6416 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 162.280240][ C1] sd 0:0:1:0: tag#6416 CDB[20]: ba 09:19:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xee00, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 162.288919][T22651] loop0: detected capacity change from 0 to 1 [ 162.289573][T22656] tmpfs: Unknown parameter 'hash' [ 162.295205][ C1] sd 0:0:1:0: tag#6417 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 162.309975][ C1] sd 0:0:1:0: tag#6417 CDB: opcode=0xe5 (vendor) [ 162.316323][ C1] sd 0:0:1:0: tag#6417 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 162.325685][ C1] sd 0:0:1:0: tag#6417 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 162.334807][ C1] sd 0:0:1:0: tag#6417 CDB[20]: ba 09:19:33 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe003000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 162.340926][T22656] tmpfs: Unknown parameter 'hash' [ 162.358585][T22651] loop0: p1 < > p2 < > p4 [ 162.363022][T22651] loop0: partition table partially beyond EOD, truncated [ 162.370461][T22655] loop3: p2 < > p4 [ 162.379970][T22655] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:33 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031404000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xef00, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 162.399255][T22651] loop0: p1 start 335762607 is beyond EOD, truncated [ 162.405958][T22651] loop0: p2 size 2 extends beyond EOD, truncated [ 162.413477][T22761] tmpfs: Unknown parameter 'hash' [ 162.419166][T22651] loop0: p4 size 2097152 extends beyond EOD, truncated [ 162.427804][ T380] loop0: p1 < > p2 < > p4 [ 162.428886][T22764] loop4: detected capacity change from 0 to 1 [ 162.432267][ T380] loop0: partition table partially beyond EOD, truncated 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:33 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031406000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 162.440441][T22762] loop1: detected capacity change from 0 to 264192 [ 162.451937][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 162.458664][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 162.467250][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:33 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe400000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf200, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 162.490043][T22768] tmpfs: Unknown parameter 'hash' [ 162.500119][T22762] loop1: p2 < > p4 [ 162.504503][T22764] loop4: p1 < > p2 < > p4 [ 162.508968][T22764] loop4: partition table partially beyond EOD, truncated [ 162.509383][T22770] loop3: detected capacity change from 0 to 264192 [ 162.517249][T22764] loop4: p1 start 335762607 is beyond EOD, truncated [ 162.522808][T22762] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:33 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe4ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 162.529429][T22764] loop4: p2 size 2 extends beyond EOD, truncated [ 162.549720][T22770] loop3: p2 < > p4 [ 162.554207][T22768] tmpfs: Unknown parameter 'hash' [ 162.555627][T22764] loop4: p4 size 2097152 extends beyond EOD, truncated [ 162.565580][T22773] loop0: detected capacity change from 0 to 1 [ 162.577531][T22770] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:33 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe4ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xff03, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 162.599337][T22773] loop0: p1 < > p2 < > p4 [ 162.603935][T22773] loop0: partition table partially beyond EOD, truncated [ 162.619448][T22778] tmpfs: Unknown parameter 'hash' [ 162.625460][T22773] loop0: p1 start 335762607 is beyond EOD, truncated [ 162.628838][T22776] loop1: detected capacity change from 0 to 264192 [ 162.632256][T22773] loop0: p2 size 2 extends beyond EOD, truncated 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 162.645824][T22778] tmpfs: Unknown parameter 'hash' [ 162.651124][T22780] loop3: detected capacity change from 0 to 264192 [ 162.658031][T22773] loop0: p4 size 2097152 extends beyond EOD, truncated [ 162.671068][T22776] loop1: p2 < > p4 [ 162.678495][T22776] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:33 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031404000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xec00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:33 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xec00000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 162.698697][T22780] loop3: p2 < > p4 [ 162.702948][T22780] loop3: p4 size 2097152 extends beyond EOD, truncated [ 162.715133][T22786] loop4: detected capacity change from 0 to 1 [ 162.722615][T22784] tmpfs: Unknown parameter 'hash' 09:19:33 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031407000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 162.768583][T22790] loop1: detected capacity change from 0 to 264192 [ 162.778811][ T380] loop4: p1 < > p2 < > p4 [ 162.778927][T22784] tmpfs: Unknown parameter 'hash' [ 162.783247][ T380] loop4: partition table partially beyond EOD, truncated [ 162.795691][T22794] loop0: detected capacity change from 0 to 1 [ 162.797547][T22792] loop3: detected capacity change from 0 to 264192 [ 162.808704][ T380] loop4: p1 start 335762607 is beyond EOD, truncated 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 162.815380][ T380] loop4: p2 size 2 extends beyond EOD, truncated [ 162.827963][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated [ 162.835311][T22790] loop1: p2 < > p4 [ 162.840053][T22790] loop1: p4 size 2097152 extends beyond EOD, truncated [ 162.848720][T22794] loop0: p1 < > p2 < > p4 [ 162.853158][T22794] loop0: partition table partially beyond EOD, truncated [ 162.854534][T22792] loop3: p2 < > p4 [ 162.860372][T22794] loop0: p1 start 335762607 is beyond EOD, truncated [ 162.869510][T22786] loop4: p1 < > p2 < > p4 [ 162.870907][T22794] loop0: p2 size 2 extends beyond EOD, truncated [ 162.875304][T22786] loop4: partition table partially beyond EOD, truncated [ 162.875461][T22786] loop4: p1 start 335762607 is beyond EOD, [ 162.882155][T22794] loop0: p4 size 2097152 extends beyond EOD, [ 162.888692][T22786] truncated [ 162.888696][T22786] loop4: p2 size 2 extends beyond EOD, truncated [ 162.892920][T22786] loop4: p4 size 2097152 extends beyond EOD, [ 162.894612][T22794] truncated 09:19:33 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xeeffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:33 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xe4ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 162.919267][T22786] truncated [ 162.920223][T22792] loop3: p4 size 2097152 extends beyond EOD, truncated [ 162.925166][T22798] tmpfs: Unknown parameter 'hash' [ 162.950840][T22800] loop1: detected capacity change from 0 to 264192 09:19:33 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031408000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xeeffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 162.969393][T22798] tmpfs: Unknown parameter 'hash' [ 162.986358][T22800] loop1: p2 < > p4 [ 162.999723][T22800] loop1: p4 size 2097152 extends beyond EOD, truncated [ 163.005455][T22806] loop3: detected capacity change from 0 to 264192 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 163.017583][T22805] loop0: detected capacity change from 0 to 1 [ 163.018776][T22808] loop4: detected capacity change from 0 to 264192 09:19:33 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xf6ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.078828][ T4668] loop3: p2 < > p4 [ 163.083442][T22808] loop4: p2 < > p4 [ 163.087517][ T4668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 163.090948][T22808] loop4: p4 size 2097152 extends beyond EOD, truncated [ 163.095692][T22805] loop0: p1 < > p2 < > p4 [ 163.105687][T22805] loop0: partition table partially beyond EOD, truncated [ 163.119477][T22806] loop3: p2 < > p4 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 163.130600][T22806] loop3: p4 size 2097152 extends beyond EOD, truncated [ 163.151642][T22914] loop1: detected capacity change from 0 to 264192 09:19:33 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x97ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:33 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xf6ffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.174621][T22805] loop0: p1 start 335762607 is beyond EOD, truncated [ 163.181356][T22805] loop0: p2 size 2 extends beyond EOD, truncated [ 163.191730][ T4660] loop1: p2 < > p4 [ 163.198835][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 163.204148][T22920] loop4: detected capacity change from 0 to 264192 [ 163.214172][ T380] loop1: p2 < > p4 [ 163.218469][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:33 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031409000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.222202][T22805] loop0: p4 size 2097152 extends beyond EOD, truncated [ 163.228843][T22922] loop3: detected capacity change from 0 to 264192 [ 163.240488][T22919] tmpfs: Unknown parameter 'hash' [ 163.246403][T22914] loop1: p2 < > p4 [ 163.251564][T22920] loop4: p2 < > p4 [ 163.259056][T22920] loop4: p4 size 2097152 extends beyond EOD, truncated [ 163.262590][T22914] loop1: p4 size 2097152 extends beyond EOD, truncated [ 163.273494][T22919] tmpfs: Unknown parameter 'hash' 09:19:33 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfbffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:33 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af540b1400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.284934][T22922] loop3: p2 < > p4 [ 163.289191][T22922] loop3: p4 size 2097152 extends beyond EOD, truncated [ 163.303043][T22926] loop0: detected capacity change from 0 to 1 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd030000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 163.330229][ T4660] udevd[4660]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 163.342221][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 163.342404][ T3246] udevd[3246]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 163.357897][T22931] loop4: detected capacity change from 0 to 1 [ 163.368989][T22928] tmpfs: Unknown parameter 'hash' 09:19:34 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfbffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.377462][ T4668] loop0: p1 < > p2 < > p4 [ 163.381893][ T4668] loop0: partition table partially beyond EOD, truncated [ 163.389176][ T4668] loop0: p1 start 335762607 is beyond EOD, truncated [ 163.391248][T22932] loop1: detected capacity change from 0 to 264192 [ 163.395921][ T4668] loop0: p2 size 2 extends beyond EOD, truncated [ 163.409682][ T4668] loop0: p4 size 2097152 extends beyond EOD, truncated [ 163.417899][T22928] tmpfs: Unknown parameter 'hash' [ 163.422923][T22936] loop3: detected capacity change from 0 to 264192 [ 163.429845][T22926] loop0: p1 < > p2 < > p4 [ 163.434299][T22926] loop0: partition table partially beyond EOD, truncated [ 163.441566][T22926] loop0: p1 start 335762607 is beyond EOD, truncated [ 163.441652][ T380] loop4: p2 < > p4 [ 163.448239][T22926] loop0: p2 size 2 extends beyond EOD, truncated [ 163.452406][ T380] loop4: p2 size 2 extends beyond EOD, truncated [ 163.459386][T22926] loop0: p4 size 2097152 extends beyond EOD, truncated [ 163.468988][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:34 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140a000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x10030000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 163.478775][T22936] loop3: p2 < > p4 [ 163.483162][T22932] loop1: p2 < > p4 [ 163.487481][T22932] loop1: p4 size 2097152 extends beyond EOD, truncated [ 163.496369][T22936] loop3: p4 size 2097152 extends beyond EOD, truncated [ 163.506232][T22931] loop4: p2 < > p4 [ 163.508476][T22939] tmpfs: Unknown parameter 'hash' [ 163.510218][T22931] loop4: p2 size 2 extends beyond EOD, truncated [ 163.521990][T22931] loop4: p4 size 2097152 extends beyond EOD, truncated 09:19:34 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdfdffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:34 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdfdffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xf, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 163.544571][T22939] tmpfs: Unknown parameter 'hash' [ 163.553047][T22941] loop0: detected capacity change from 0 to 1 09:19:34 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfbffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.592283][T22946] loop1: detected capacity change from 0 to 264192 [ 163.598618][T22941] loop0: p1 < > p2 < > p4 [ 163.601515][T22948] loop3: detected capacity change from 0 to 264192 [ 163.603271][T22941] loop0: partition table partially beyond EOD, truncated [ 163.617723][T22941] loop0: p1 start 335762607 is beyond EOD, truncated [ 163.624473][T22941] loop0: p2 size 2 extends beyond EOD, truncated [ 163.632282][T22941] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x11030000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 163.639059][T22949] tmpfs: Unknown parameter 'hash' [ 163.648653][ T380] loop1: p2 < > p4 [ 163.649010][T22948] loop3: p2 < > p4 [ 163.653800][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 163.656886][T22951] loop4: detected capacity change from 0 to 264192 [ 163.670521][T22949] tmpfs: Unknown parameter 'hash' [ 163.675597][T22948] loop3: p4 size 2097152 extends beyond EOD, truncated [ 163.678006][T22946] loop1: p2 < > p4 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:34 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140b000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:34 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.686667][T22946] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:34 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfdffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.719124][T22951] loop4: p2 < > p4 [ 163.722835][T22957] loop0: detected capacity change from 0 to 1 [ 163.730384][T22951] loop4: p4 size 2097152 extends beyond EOD, [ 163.730392][T22955] tmpfs: Unknown parameter 'hash' [ 163.741516][T22951] truncated [ 163.757507][T22959] loop1: detected capacity change from 0 to 264192 09:19:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) getrlimit(0xf, &(0x7f0000000080)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = inotify_init() setrlimit(0xa, &(0x7f0000000280)) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x610008cf) r1 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x202) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file1\x00'}) splice(r3, &(0x7f0000000300)=0x6, r2, &(0x7f0000000340)=0x200, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000100), 0x5, 0x408100) splice(r0, &(0x7f00000000c0)=0xb1, r5, &(0x7f0000000180)=0x3ff, 0x2, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffe, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000240)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) inotify_init1(0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) [ 163.767557][ T380] loop4: p2 < > p4 [ 163.771679][T22957] loop0: p1 < > p2 < > p4 [ 163.773385][ T380] loop4: p4 size 2097152 extends beyond EOD, [ 163.776094][T22957] loop0: partition table partially beyond EOD, [ 163.782190][ T380] truncated [ 163.791552][T22957] truncated [ 163.796906][T22962] tmpfs: Unknown parameter 'hash' [ 163.798776][T22959] loop1: p2 < > p4 [ 163.808443][T22959] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:34 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfeffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 163.810880][T22963] loop3: detected capacity change from 0 to 264192 [ 163.822449][T22957] loop0: p1 start 335762607 is beyond EOD, truncated [ 163.829174][T22957] loop0: p2 size 2 extends beyond EOD, truncated [ 163.836032][T22957] loop0: p4 size 2097152 extends beyond EOD, truncated [ 163.843957][T22962] tmpfs: Unknown parameter 'hash' [ 163.854281][T22963] loop3: p2 < > p4 [ 163.861312][T22963] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 163.870765][ C1] sd 0:0:1:0: tag#6422 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 163.880612][ C1] sd 0:0:1:0: tag#6422 CDB: opcode=0xe5 (vendor) [ 163.884955][T22969] loop1: detected capacity change from 0 to 264192 [ 163.886935][ C1] sd 0:0:1:0: tag#6422 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 163.902481][ C1] sd 0:0:1:0: tag#6422 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 163.911640][ C1] sd 0:0:1:0: tag#6422 CDB[20]: ba 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x22, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 163.918078][T22971] tmpfs: Unknown parameter 'hash' 09:19:34 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140c000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x13030000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 163.982675][T22973] tmpfs: Unknown parameter 'hash' 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 164.009202][T22973] tmpfs: Unknown parameter 'hash' 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x18000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 164.057619][T22978] tmpfs: Unknown parameter 'hash' 09:19:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 164.079009][T22978] tmpfs: Unknown parameter 'hash' 09:19:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 164.127993][T22982] tmpfs: Unknown parameter 'hash' [ 164.149572][T22982] tmpfs: Unknown parameter 'hash' [ 164.162646][T22969] loop1: p2 < > p4 [ 164.186201][T22985] loop0: detected capacity change from 0 to 1 [ 164.192446][T22969] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:35 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfeffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 164.588729][ T4668] loop0: p1 < > p2 < > p4 [ 164.593183][ T4668] loop0: partition table partially beyond EOD, truncated [ 164.608558][ C1] sd 0:0:1:0: tag#6423 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 164.612704][T22987] loop3: detected capacity change from 0 to 264192 [ 164.618436][ C1] sd 0:0:1:0: tag#6423 CDB: opcode=0xe5 (vendor) [ 164.626484][ T4668] loop0: p1 start 335762607 is beyond EOD, truncated 09:19:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) getrlimit(0xf, &(0x7f0000000080)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = inotify_init() setrlimit(0xa, &(0x7f0000000280)) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x610008cf) r1 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x202) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file1\x00'}) splice(r3, &(0x7f0000000300)=0x6, r2, &(0x7f0000000340)=0x200, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000100), 0x5, 0x408100) splice(r0, &(0x7f00000000c0)=0xb1, r5, &(0x7f0000000180)=0x3ff, 0x2, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffe, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000240)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) inotify_init1(0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 09:19:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:35 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:35 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfeffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 164.631257][ C1] sd 0:0:1:0: tag#6423 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 164.631277][ C1] sd 0:0:1:0: tag#6423 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 164.631291][ C1] sd 0:0:1:0: tag#6423 CDB[20]: ba [ 164.661169][ T4668] loop0: p2 size 2 extends beyond EOD, truncated [ 164.662912][ C1] sd 0:0:1:0: tag#6424 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 164.677534][ C1] sd 0:0:1:0: tag#6424 CDB: opcode=0xe5 (vendor) 09:19:35 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x24010000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 164.683883][ C1] sd 0:0:1:0: tag#6424 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 164.688289][T22994] loop1: detected capacity change from 0 to 264192 [ 164.692939][ C1] sd 0:0:1:0: tag#6424 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 164.708412][ C1] sd 0:0:1:0: tag#6424 CDB[20]: ba [ 164.711393][T22993] tmpfs: Unknown parameter 'hash' [ 164.736485][ T4668] loop0: p4 size 2097152 extends beyond EOD, truncated [ 164.744199][T22993] tmpfs: Unknown parameter 'hash' [ 165.281789][T22987] loop3: p2 < > p4 [ 165.282048][T22985] loop0: p1 < > p2 < > p4 [ 165.290145][T22985] loop0: partition table partially beyond EOD, truncated [ 165.297568][T22987] loop3: p4 size 2097152 extends beyond EOD, truncated [ 165.304733][T22985] loop0: p1 start 335762607 is beyond EOD, truncated [ 165.311584][T22985] loop0: p2 size 2 extends beyond EOD, truncated [ 165.318834][T22994] loop1: p2 < > p4 [ 165.323594][T22994] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:35 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140d000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:35 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x26000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f0000000000000002000000020fff00008000000080000020000000d4f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) open(&(0x7f0000000040)='./file0\x00', 0xe0882, 0xb0) 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:36 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xff0f000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xff0f000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 165.327709][T22985] loop0: p4 size 2097152 extends beyond EOD, truncated [ 165.357117][T23004] loop4: detected capacity change from 0 to 4 [ 165.363939][T23004] EXT4-fs (loop4): Invalid log cluster size: 16715522 [ 165.372281][T23003] tmpfs: Unknown parameter 'hash' 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 165.409684][T23008] loop3: detected capacity change from 0 to 264192 [ 165.419003][T23010] loop1: detected capacity change from 0 to 264192 [ 165.430696][T23012] tmpfs: Unknown parameter 'hash' [ 165.435371][T23004] loop4: detected capacity change from 0 to 4 [ 165.446124][T23004] EXT4-fs (loop4): Invalid log cluster size: 16715522 [ 165.451986][T23014] loop0: detected capacity change from 0 to 1 09:19:36 executing program 4: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x6) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x400) lseek(r0, 0xffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0xc4800, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) close(r0) [ 165.453522][ T380] loop3: p2 < > p4 [ 165.460073][T23010] loop1: p2 < > p4 [ 165.468563][T23012] tmpfs: Unknown parameter 'hash' [ 165.472847][T23010] loop1: p4 size 2097152 extends beyond EOD, truncated [ 165.480665][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 165.480973][T23014] loop0: p1 < > p2 < > p4 [ 165.492043][T23014] loop0: partition table partially beyond EOD, truncated [ 165.500067][T23014] loop0: p1 start 335762607 is beyond EOD, truncated 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 165.506777][T23014] loop0: p2 size 2 extends beyond EOD, truncated [ 165.521484][ T380] loop3: p2 < > p4 [ 165.526236][T23014] loop0: p4 size 2097152 extends beyond EOD, truncated [ 165.529435][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 165.549170][T23020] tmpfs: Unknown parameter 'hash' 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x6d000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:36 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140e000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=@routing, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000001c0), 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, 0x1c) fdatasync(r0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000300)="1e", 0x580}], 0x1) sendto$inet6(r0, &(0x7f0000000200)="0df64a252ab83159a7e8ddfaec882179cb4ee034fcbb6560b5563ef4798b2aeb7f6679402854094e840fda6402623282e863481a8ecc4d555a0182f49bc687cce8a95368bb344df54c183018c1ce4b9ae58999b5f97e8a44930278514c01b3975d8826126c9f98e4c1103a333dbc869896bbb07c3ac3176e09762724bc7a3d8fb97dd7b1f174a60551f10350ae03125311fc06d101fb935f4372d728debbba8233fbe0b9a15e94a30e94f4eabb34a93c45be28715044557ae9209c55510146f73f9293dc096e58badbda361096a892c45d61ee4c1a33c80b544c751fdd71c41bf72ac3914f2fd8f700964ef6375a090a12", 0xf1, 0x20000000, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffff30b, @local, 0x2}, 0x1c) 09:19:36 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffefffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 165.559468][T23008] loop3: p2 < > p4 [ 165.568671][T23008] loop3: p4 size 2097152 extends beyond EOD, truncated [ 165.589721][T23020] tmpfs: Unknown parameter 'hash' 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 165.605939][T23125] loop1: detected capacity change from 0 to 264192 [ 165.618503][T23140] loop0: detected capacity change from 0 to 1 [ 165.639252][T23125] ================================================================== [ 165.647357][T23125] BUG: KCSAN: data-race in __add_to_page_cache_locked / invalidate_bdev [ 165.655699][T23125] 09:19:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x55, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000380)='./bus\x00', 0x14d8c2, 0x0) r1 = syz_io_uring_complete(0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x26, 0xf9, 0x7, 0x68, 0x0, 0x813, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x4, 0x2}, 0x17040, 0x1, 0x9, 0x2, 0x4, 0x8, 0x7f, 0x0, 0x10000, 0x0, 0x81}, r1, 0xf, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 165.658017][T23125] write to 0xffff888100433be8 of 8 bytes by task 4660 on cpu 0: [ 165.665646][T23125] __add_to_page_cache_locked+0x276/0x4f0 [ 165.671375][T23125] add_to_page_cache_lru+0xa0/0x1b0 [ 165.676580][T23125] page_cache_ra_unbounded+0x274/0x430 [ 165.682047][T23125] force_page_cache_ra+0x256/0x290 [ 165.687162][T23125] page_cache_sync_ra+0xcc/0xe0 [ 165.692011][T23125] filemap_read+0x3ad/0x1220 [ 165.696602][T23125] generic_file_read_iter+0x75/0x2c0 [ 165.701888][T23125] blkdev_read_iter+0xb9/0xf0 [ 165.706555][T23125] vfs_read+0x66c/0x750 [ 165.710712][T23125] ksys_read+0xd9/0x190 [ 165.714873][T23125] __x64_sys_read+0x3e/0x50 [ 165.719378][T23125] do_syscall_64+0x44/0xa0 [ 165.723925][T23125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.729817][T23125] [ 165.732169][T23125] read to 0xffff888100433be8 of 8 bytes by task 23125 on cpu 1: [ 165.739795][T23125] invalidate_bdev+0x31/0x80 [ 165.744479][T23125] bdev_disk_changed+0xf6/0xe60 [ 165.749331][T23125] loop_set_status+0x4e2/0x5a0 [ 165.754101][T23125] lo_ioctl+0x82c/0x13e0 [ 165.758344][T23125] blkdev_ioctl+0x1d0/0x3f0 [ 165.762827][T23125] block_ioctl+0x6e/0x80 [ 165.767115][T23125] __se_sys_ioctl+0xcb/0x140 [ 165.771684][T23125] __x64_sys_ioctl+0x3f/0x50 [ 165.776250][T23125] do_syscall_64+0x44/0xa0 [ 165.780708][T23125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 165.786585][T23125] [ 165.788898][T23125] value changed: 0x0000000000000003 -> 0x0000000000000004 [ 165.796045][T23125] [ 165.798346][T23125] Reported by Kernel Concurrency Sanitizer on: 09:19:36 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffefffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 165.804589][T23125] CPU: 1 PID: 23125 Comm: syz-executor.1 Not tainted 5.15.0-rc7-syzkaller #0 [ 165.813360][T23125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.823412][T23125] ================================================================== [ 165.834301][ T5609] loop0: p1 < > p2 < > p4 [ 165.838767][ T5609] loop0: partition table partially beyond EOD, truncated [ 165.845866][ T5609] loop0: p1 start 335762607 is beyond EOD, truncated [ 165.852627][ T5609] loop0: p2 size 2 extends beyond EOD, truncated 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:36 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff7f00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 165.862214][T23125] loop1: p2 < > p4 [ 165.868860][T23125] loop1: p4 size 2097152 extends beyond EOD, truncated [ 165.876968][T23434] loop3: detected capacity change from 0 to 264192 [ 165.888489][ T5609] loop0: p4 size 2097152 extends beyond EOD, truncated [ 165.897456][T23140] loop0: p1 < > p2 < > p4 [ 165.901889][T23140] loop0: partition table partially beyond EOD, truncated [ 165.907284][T23434] loop3: p2 < > p4 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:36 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffefffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 165.913438][T23434] loop3: p4 size 2097152 extends beyond EOD, truncated [ 165.917323][T23140] loop0: p1 start 335762607 is beyond EOD, truncated [ 165.926978][T23140] loop0: p2 size 2 extends beyond EOD, truncated [ 165.933398][T23438] loop1: detected capacity change from 0 to 264192 [ 165.941762][T23140] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:36 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff7f00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 165.962196][T23441] tmpfs: Unknown parameter 'hash' [ 165.969008][ T4660] loop1: p2 < > p4 [ 165.971633][T23443] loop4: detected capacity change from 0 to 264192 [ 165.976319][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 165.989085][T23441] tmpfs: Unknown parameter 'hash' [ 166.003990][T23438] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 166.020935][T23443] loop4: p2 < > p4 09:19:36 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403140f000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 166.043316][T23445] loop3: detected capacity change from 0 to 264192 [ 166.050650][T23443] loop4: p4 size 2097152 extends beyond EOD, truncated [ 166.064799][ T380] loop4: p2 < > p4 [ 166.069141][T23445] loop3: p2 < > p4 [ 166.069385][ T380] loop4: p4 size 2097152 extends beyond EOD, truncated [ 166.075438][T23449] loop0: detected capacity change from 0 to 1 [ 166.080603][T23445] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xda020000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 166.094322][T23451] tmpfs: Unknown parameter 'hash' 09:19:36 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = open(&(0x7f0000004400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x8) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x6000241) unlink(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x4) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x141080, 0x17b) sendfile(r2, r1, &(0x7f00000001c0)=0xffffffffffffffff, 0xa198) 09:19:36 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xdaffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:36 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffff00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.119409][T23451] tmpfs: Unknown parameter 'hash' [ 166.128773][T23449] loop0: p1 < > p2 < > p4 [ 166.133213][T23449] loop0: partition table partially beyond EOD, truncated [ 166.135456][T23455] loop1: detected capacity change from 0 to 264192 [ 166.155887][T23449] loop0: p1 start 335762607 is beyond EOD, truncated [ 166.162633][T23449] loop0: p2 size 2 extends beyond EOD, truncated [ 166.179141][T23461] tmpfs: Unknown parameter 'hash' [ 166.180996][T23449] loop0: p4 size 2097152 extends beyond EOD, truncated [ 166.193078][ T380] loop0: p1 < > p2 < > p4 [ 166.197512][ T380] loop0: partition table partially beyond EOD, truncated [ 166.200531][T23500] loop3: detected capacity change from 0 to 264192 [ 166.204981][T23455] loop1: p2 < > p4 [ 166.211885][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 166.215334][T23455] loop1: p4 size 2097152 extends beyond EOD, 09:19:36 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffff7f00000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 166.221625][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 166.227676][T23455] truncated [ 166.237827][T23461] tmpfs: Unknown parameter 'hash' [ 166.247280][T23500] loop3: p2 < > p4 [ 166.257640][T23500] loop3: p4 size 2097152 extends beyond EOD, truncated [ 166.268373][T23566] loop4: detected capacity change from 0 to 264192 09:19:36 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031410000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xec000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 166.276725][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 166.296699][T23568] tmpfs: Unknown parameter 'hash' [ 166.306316][T23570] loop1: detected capacity change from 0 to 264192 09:19:36 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffff0700, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.329408][T23566] loop4: p2 < > p4 [ 166.333981][T23566] loop4: p4 size 2097152 extends beyond EOD, truncated [ 166.352194][T23575] loop0: detected capacity change from 0 to 1 [ 166.368093][T23578] loop3: detected capacity change from 0 to 264192 [ 166.368915][ T4660] loop1: p2 < > p4 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xee000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xdaffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 166.379817][T23576] tmpfs: Unknown parameter 'hash' [ 166.381738][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 166.393874][T23575] loop0: p1 < > p2 < > p4 [ 166.398336][T23575] loop0: partition table partially beyond EOD, truncated [ 166.401763][T23578] loop3: p2 < > p4 [ 166.407654][T23575] loop0: p1 start 335762607 is beyond EOD, truncated [ 166.415975][T23575] loop0: p2 size 2 extends beyond EOD, truncated [ 166.424988][T23576] tmpfs: Unknown parameter 'hash' 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:37 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031411000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031410000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.428635][T23575] loop0: p4 size 2097152 extends beyond EOD, truncated [ 166.437150][T23570] loop1: p2 < > p4 [ 166.444264][T23578] loop3: p4 size 2097152 extends beyond EOD, truncated [ 166.451332][T23570] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xef000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 166.500686][T23587] loop0: detected capacity change from 0 to 1 [ 166.508221][T23588] loop4: detected capacity change from 0 to 1 [ 166.513074][T23584] tmpfs: Unknown parameter 'hash' [ 166.528904][T23587] loop0: p1 < > p2 < > p4 [ 166.533346][T23587] loop0: partition table partially beyond EOD, truncated 09:19:37 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffff7f, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.547721][T23588] loop4: p1 < > p2 < > p4 [ 166.552233][T23588] loop4: partition table partially beyond EOD, truncated [ 166.552379][T23591] loop1: detected capacity change from 0 to 264192 [ 166.559440][T23588] loop4: p1 start 335762607 is beyond EOD, truncated [ 166.566223][T23587] loop0: p1 start 335762607 is beyond EOD, truncated [ 166.572565][T23588] loop4: p2 size 2 extends beyond EOD, truncated [ 166.573324][T23588] loop4: p4 size 2097152 extends beyond EOD, [ 166.579326][T23587] loop0: p2 size 2 extends beyond EOD, truncated 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf0ffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 166.593453][T23587] loop0: p4 size 2097152 extends beyond EOD, [ 166.598108][T23588] truncated [ 166.607380][T23587] truncated [ 166.612700][T23594] loop3: detected capacity change from 0 to 264192 [ 166.620077][T23596] tmpfs: Unknown parameter 'hash' [ 166.623559][ T380] loop0: p1 < > p2 < > p4 [ 166.629998][ T380] loop0: partition table partially beyond EOD, truncated [ 166.638415][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 166.639407][T23591] loop1: p2 < > p4 09:19:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0xac02) r1 = mq_open(&(0x7f0000001540)='/dev/snd/seq\x00', 0x80, 0xf2344c6e8d3897c7, &(0x7f0000001580)={0x3, 0x9, 0x2, 0x400}) syncfs(r1) writev(r0, &(0x7f0000001640)=[{&(0x7f00000000c0)="ae885b10240b0000010200002052caf9000098f0f60e030000901a4aced6f7fee8ffffffff08d5962c0600f3fc00", 0x2e}, {&(0x7f0000001680)="d7b318192d9b2e14e12ab56ade333abbe67192d0ed1c8d8baa18bc74559f3aae537dd3db42629ab10c18848118c0bc6175776c366a417150c5de6bfb23d46c127d0ff693a2ffa94ed729aae43b63e410775291a6209780e28218ec6bc27aba0f6bbaaf39e74ca24c9d6c50202406469e240c63c1cb8380d73d7f32db994beb1f9c7d052143d29e03dc5ad16e807eef4484deec186ec100b9a474dd2fd28d630d2345440a275f907a8b9d5603d05229d05f6f43f1fcc0e5587d577c2fd6869a18883a20c0f7408b21db053c598755cdb98c5b3376d92a6b67c20f50c84341dec877e7ec6b7d6049a43c2f5047fb93873c9829db5549db0aa78c8f91e49551b08d25ed124ded4b92e870573992270af553f6f4b7e4e79730343cb5cbb29b0c", 0x11e}, {&(0x7f0000002380)="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", 0x1000}], 0x3) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000340)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x801) writev(r2, &(0x7f00000014c0)=[{&(0x7f0000000100)="8632d2bfb6e271fa4b9df4187ef2ccfbd14938bc655c73e9726f2e059786c011876264c3433d856eb396453d8f6327abe8a8dea11b258aaf54893e2efb1085e1b2b60121f53940596599ca90cb6c276f4b9b4020b05780cb95e4cfcbe57e400d77c38ebb9c075331e1de55d64b936b18173ebf5e8e4dd11461967a9ab3397f2df6c990f42332fcb3fb315b1f4c740fe8ab824cfed22ee0f45436a00b4613967dfbd12fbafedfec80cda0ccdc65e553c023a0166ea51f1ca6a9e08771e0245eaa25477defcde7c12405e5d8acc1c4feeac1db2a328e2291722ecf6299d26eb8e01514d94a", 0xe4}, {&(0x7f0000000040)="87d8f00b30d234912f5ca4bcdccd81a793beb6d74131f02460b31a72adededc269bc7ac15d90a9a4940fbd98d1854fb812ff255cee5929cd802b7f9b7215d16d9af1", 0x42}, {&(0x7f0000000200)="bc826ba7e932f3ff4bb3831f76f7a17c099c73b9f6146d613f8dbb07bd1063f104a3", 0x22}, {&(0x7f0000000240)="001d9f3d749abdb227c7bb17cffedf142af72d3be0ef15c38ae5acfa32a74084eeec9978ff669e01ff914739db85e9332709b61047a1c404995b30178adafb4887d852106594bd3ba47c677f905b56a8a7675a306182b0c98b160e7899310896809a7dfe45b4088d3859e5aa468f7e3c7ef639e24dcb72c85f110d076c1bd944263ec0e8bacae5b8778c6b", 0x8b}, {&(0x7f00000004c0)="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", 0x1000}], 0x5) 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 166.645191][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 166.658944][T23594] loop3: p2 < > p4 [ 166.663984][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 166.666224][T23596] tmpfs: Unknown parameter 'hash' [ 166.675441][T23594] loop3: p4 size 2097152 extends beyond EOD, truncated [ 166.683152][T23591] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf2000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 166.720449][T23632] tmpfs: Unknown parameter 'hash' 09:19:37 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="02f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.744242][T23587] loop0: detected capacity change from 0 to 1 [ 166.756458][T23632] tmpfs: Unknown parameter 'hash' [ 166.779259][T23707] loop1: detected capacity change from 0 to 1 09:19:37 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031412000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 166.789472][T23708] loop3: detected capacity change from 0 to 264192 [ 166.790714][T23710] loop4: detected capacity change from 0 to 264192 [ 166.824563][T23712] tmpfs: Unknown parameter 'hash' [ 166.829407][T23707] loop1: p2 < > p4 [ 166.833564][T23707] loop1: p2 size 2 extends beyond EOD, truncated [ 166.840287][T23708] loop3: p2 < > p4 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:37 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="04f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="02f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.845328][T23708] loop3: p4 size 2097152 extends beyond EOD, truncated [ 166.848883][T23707] loop1: p4 size 2097152 extends beyond EOD, truncated [ 166.855558][T23710] loop4: p2 < > p4 [ 166.864251][T23710] loop4: p4 size 2097152 extends beyond EOD, truncated [ 166.873011][T23712] tmpfs: Unknown parameter 'hash' 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:37 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0xffffffffffffffff, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 166.929847][T23716] loop0: detected capacity change from 0 to 1 [ 166.940482][T23722] tmpfs: Unknown parameter 'hash' [ 166.942725][T23720] loop3: detected capacity change from 0 to 1 [ 166.958983][T23718] loop1: detected capacity change from 0 to 1 [ 166.965320][T23725] loop4: detected capacity change from 0 to 264192 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 166.978509][ T380] loop0: p1 < > p2 < > p4 [ 166.982768][T23720] loop3: p2 < > p4 [ 166.982939][ T380] loop0: partition table partially beyond EOD, truncated [ 166.986936][T23720] loop3: p2 size 2 extends beyond EOD, truncated [ 166.996715][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 167.001761][T23720] loop3: p4 size 2097152 extends beyond EOD, [ 167.006879][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 167.015307][T23718] loop1: p2 < > p4 [ 167.019332][T23720] truncated [ 167.026678][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 167.027474][T23728] tmpfs: Unknown parameter 'hash' [ 167.034093][T23718] loop1: p2 size 2 extends beyond EOD, truncated [ 167.039074][T23725] loop4: p2 < > p4 [ 167.049273][T23718] loop1: p4 size 2097152 extends beyond EOD, truncated [ 167.056971][T23716] loop0: p1 < > p2 < > p4 [ 167.061505][T23716] loop0: partition table partially beyond EOD, truncated [ 167.062469][T23725] loop4: p4 size 2097152 extends beyond EOD, truncated 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xff030000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 167.075603][T23716] loop0: p1 start 335762607 is beyond EOD, truncated [ 167.082316][T23716] loop0: p2 size 2 extends beyond EOD, truncated [ 167.089676][T23728] tmpfs: Unknown parameter 'hash' [ 167.095008][T23716] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:37 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="05f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0xf00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 167.120690][ T5609] udevd[5609]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 167.149142][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 167.160879][T23732] loop1: detected capacity change from 0 to 1 09:19:37 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031422000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="04f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007f00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100070053ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000340)="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", 0x295, 0x11580}], 0x0, &(0x7f0000000600)=ANY=[]) creat(&(0x7f0000000040)='./file0\x00', 0x0) 09:19:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 167.178922][T23734] tmpfs: Unknown parameter 'hash' [ 167.199132][T23732] loop1: p2 < > p4 [ 167.203237][T23734] tmpfs: Unknown parameter 'hash' [ 167.209855][T23732] loop1: p2 size 2 extends beyond EOD, truncated [ 167.212880][T23739] loop4: detected capacity change from 0 to 264192 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 167.240910][T23740] loop3: detected capacity change from 0 to 1 [ 167.244574][T23742] loop0: detected capacity change from 0 to 1 [ 167.248840][T23732] loop1: p4 size 2097152 extends beyond EOD, truncated [ 167.260712][T23739] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 167.278484][T23739] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 17 09:19:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 167.295793][ T380] loop1: p2 < > p4 [ 167.301471][T23747] tmpfs: Unknown parameter 'hash' [ 167.306709][T23740] loop3: p2 < > p4 [ 167.310845][ T380] loop1: p2 size 2 extends beyond EOD, truncated [ 167.317590][T23740] loop3: p2 size 2 extends beyond EOD, truncated [ 167.318515][T23742] loop0: p1 < > p2 < > p4 [ 167.324587][ T380] loop1: p4 size 2097152 extends beyond EOD, truncated [ 167.328432][T23742] loop0: partition table partially beyond EOD, truncated [ 167.343027][T23739] ext4_test_bit(bit=16, block=18) = 1 [ 167.348483][T23739] is_bad_inode(inode)=0 [ 167.352643][T23739] NEXT_ORPHAN(inode)=162 [ 167.356871][T23739] max_ino=32 [ 167.360067][T23739] i_nlink=0 [ 167.363464][T23742] loop0: p1 start 335762607 is beyond EOD, truncated [ 167.370144][T23742] loop0: p2 size 2 extends beyond EOD, truncated [ 167.378753][T23740] loop3: p4 size 2097152 extends beyond EOD, truncated 09:19:38 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0xdf, 0x1b, 0xffc0, 0xb2fc, 'T\x00'}) mmap(&(0x7f00004f5000/0x3000)=nil, 0x3000, 0x3000005, 0x13, 0xffffffffffffffff, 0x9650c000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800002, 0x2) syz_open_dev$evdev(&(0x7f0000000000), 0x200, 0x286400) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xee74d679fd12cda3, 0x400, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x2, 0x0, 0x0, 0x3, 0x6, 0xfffffffffffffff7, 0x5, 0x0, 0xfffffffe}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) mkdir(0x0, 0x99) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setrlimit(0x5, &(0x7f00000013c0)={0x6, 0x1}) sched_setattr(0x0, &(0x7f0000001400)={0x38, 0x2, 0x1, 0x9, 0x0, 0x5, 0x0, 0x1, 0x1ff, 0x3}, 0x0) fsopen(&(0x7f00000012c0)='qnx6\x00', 0x7de512711c7f0da9) clone(0xc0201300, &(0x7f00000002c0)="4da0f0ef9544ffbcacd19aaf9167598e7ad2b92831096936839371cb9ef65513276ca2e67855f5ef5a0eb25b9f09e4afd4757c8f3c47ecd73b8df6e10cb41472a2cd48e95c48cd96bc80521b040a10b6129c785028edfd56e72381f77d51cce983bfa51601bef4083197060c1bcdd3d9bc34349e28684f40002f3da532f1185fce3370c6e0b988f9fdd3894992fb2b5ba972a14eae1287578e05de20ddfc4e876c915a7f81f83605a18d0f8f45641a09df92501a6b91737c525b791436f2e1a5f5e8ea8e5efd6b72f6066b4e4814f20ec78d568ac90804dfeb75431fd1cce72f7d8ce97baa367272a4ef6daf3cb411bc32f20a8d1f9191c937cf54acc5406bd9af612299f5c3c98977b87dea203d45d98adff2385ec399f3df38b82a07cf4044c5b1dc1d126030137f20bd3d32e8be5a02d8e3d98997a43903e6fa4d287f6faff9e88658930e362485df7a40ce0b8897ea9485656881d3d9723402f1a709a1fa020aa4a1766e41891720ebd23d131f43ce752a110854502bd0ddf78fcc2ba3f638c80ba8eacba58ef48d1d2a64344f602b849c87787f59f5f88efa72e186fc0058a8f790eb3a1e7130f94d84b6e13a6505d9e375690ba8543f569b8bb1c8d3a62f0b2bcff9d1fa112eaf89159d893befc53b24d4a4732ffc9d3b3944e8b895756a87cc8b94908e1d6e3abb34d24b39264be67c03a745906278be3b3554daaccc81255a6353175a8c932dae202ce0f3ea68015a978cc81ffb7fcac7fe29b2852d0dd4a491d400360048415a1091dc11bf8e94d4e142be5c32f8b74f66fe73cda5aa8c4bb7714cca5e462d1d22fd2048127ea5619b53b074fee1e81444ea2d08d638da841ba9683e80aa0de3945900971bcdbb32d6abdfa5c41c88eb89c9922647b0705ca267fd43aa3a83399798b0db776cb45748f0d7a2e01ceb6f2adf79a7f22e746ef9cf461516754aa9ff7cf13d0e9dd0f8207ee9900694b1f0cad683cbbd25abf0e4345e13d9eb4562b65885a190da63a954374812fa416b54bb06b5e80a223601058d2d6c2dd02684cb3f13143fe80cd67a9e1ce71d234d5a983121d2a6b8a665fefbdd4a32f0874d819a6ee38b5ed13fc6f4c693ace80d42e5120d86e8d3528fb895f83a1502eb190f131cc14cbb645e6d99d8df22768c602bdd780b8f4c77107f17b531002265668c1b102f0098b41a6a490315012e9ad9e26268f9f773a03e565f1d39ecb65ed23581300692b62a13e2de435b1db86337eb6499455dccaad94536dbf325e5dac61d7287ed29209349e53a0b37479135d06116085fd55ff20dea5626fb28c09651749d562b3d3568119187b4dad67aa31f874a783c51081dec3f1942726f8ebf72a82680842dddf5c799334fbdf838848ae4b6e3d52fe2fc7cd958e60c9320ddd706885e96b9f05616148ebebd7984e72265bbcb9865523b146de7df9dc1b5bc8d181671d1117a6c86d7809b1bcf0aa3328a888b13ff496e1513968aa03898eed8c25c7122df6e4efc4c23f727342cc5f4d7503b2f01c8a9912bd488f0f3fd28f64e5c31c13277179f5675c97bb7c4a717a9be5d9bba66c7dcb025f2186d82a390a92fdcbb05c3565361f9ce38cb1f7e19b9b67e5dfce8065e14675abce7e31544a45e1373c9c77658d3f1a18b1b03920eebdc3540c591402d97b66c4abb32046a7d74ae57ce815e1ade7ac18e619bca24dc10d4da166b3e3e4a6c0bcf833fb923ca942d0c95529f39b9fa4c181d4e34838e3111094dc0043d770a8ff224f67c2fc468ef7b6edfbd73e88eb02efc6ac2bdf3f1f788753398484588fcb78cc099fd97af65ca14578f4ab13de0001bab45c222ca063ca7944629ac837080502d1e7d1ed0ea426c84ebfef0763fded881aae9192db12d289557581f8225fdb56199f2c5fed5076e15dde87a38aa028e0fe5451a9bb7caf35449bd58fcdbc776950ed907310bdf36294a523b8165b90c34165078b671c1ce13493f26b48987cdc35a941ba4cf8e7019a9531978c6c856c0c238ba31be3f5042d205a44b0220a3d03592315143c15cd5c040c54bd0d794be480598184e91ba377b568e7fb917ed7ed5b7db3be30a5c4672d1f5747feeaec79bd6dc2dcc19712e97fc0664d3914ef941596969f72f7cd4ad2d5d0a54742c2f2dc3c0f9395192763f92d3da9b9a852365eb7e891c35bedd4529d0f962d33230df21470febb7d33243cf63f4b04f8eda1deee9a24f34199d5bdf5cfc4069b8d5b7023302a51a246800c457d683d2feb558b07177c36a1d7fab6be7dd3f9f829c83fead90963b59aa2a4acf5ad56cb84b9dfe5b8c6dc8455fda213df418aad11ac7996293440a28a43f5de9c5229e51fb0dd8ace9d951301c1095631edbbdb392b731e556d3d1561aabd528a168b9c67eb71094ecf2f1b667e1297b6dc6b9e54be8df508fedfe2723b17166b8633e59374ef13475d45455108adc4f5cb784366c978e6d5998e0f263a48638503167d2c40b3f34f0a196e0e7876beea7f0ef95e0082d369ea9bcc0bc0144e4c9550fa63099ab386f5007d3f1911e0d9468fc36504742fb536432a0fc1c8f96dcc8e613eb53a9b6751c8109726bfdcaaf0cce9ec35eac1ffbac9cf51edbd3eaebee646035047b6a237d13fae2dce9530705803dc1734ba16900399eb5c7f0f4e495cc5f1c991bae135baa92e9f4dc88b05af017fd0dc0c861c8145d8b8987a4ae7469d7ef97e5694cd5b18e13a32fd428a4fa20fbe426055d1602e687752f17881c901f4c847c30ba5d42e73402250dd2a4f7c8abc3d2ac4cb7e64500253a2656353d4ff425ef105c6e23277176edf3cc7170736f88c6a8a637a2679e4fb190d8e384479000ae333de709f99bb6beffff18872794fcc571f32ff2d8b3ec2cb6f0c893c0ca73397e795f059281fdc790b4a0eacdef3632c486010a3e4e471f9dc6ac567b0b07237ddf5dc07912cd110416ca77adaec130d7838f8eb0a16f71619e415bc7e01cc715172a2871a34c38de3e601a948ef8c575a3740f8a3975afc4efa28ba3a2acf1d5be9ebe16e3df97e957b7c7fc3e3de12b9aca2eddd5b858d03900e9ca34ecf6621796e2b2b96be583e4172d3f8ff2cbe70f67fa198fd8fb0657fba3b078ab569dc9c8348191f35c0d57279e2ca34b310dc6f5b7ed117fd27fe23f5c4266a91f5e1915fc452021622e3f010758168d8782556696c867cf5fb2156ac26c804734b082f767bf7834b3cf6c969716ffc2e609070e3e23a471df5f68b8de05dea591b263e5e65abadc689a7daaaddea8a9c3c96b77872944f2647ff4f3fa221ce16ba798da561bc82b967c544ae2c2129a747d16bf4f241d990661357d9c3bb9eef62079196f75380c5e19518dd63bd00d5266bfd4ebe573e73002344d074b2e3a3134c5aa48a89d5b4f442cecd9dbebe4a8443af13ebb33727673b23ecab350e8f457481bd3a148d38208dc079eac28e00cf20fb48b008d8d55d171497862440a5dee652261ddf5782b030cd8386523c44dbf9d0367ea4882e740a22386bac6bef945697188a0e2ed0782d9d3565a50267281262e7287cea8c511a2a8d9f7effcf7d45806f5aa6b97a38857108bbd51a64d92c784ddef35a84b3becfcb5e39a7cf2a06649f67226c97eb1045f818ac9b151dd694a2be67ff403bfd0bafaa20397ba20378f9ff99f31e530f065676aaae28a12de3b42f46b7abc6f60d99173c3c5cdb26420b9ebdadb98057abca531377f5fea506bf1236264c34fe2e54ea1af098cccc5c4666de23a78e5a31e1bf68260feb735d0e996473bf548f08367e5e20e6188a1fb6a508945768c3e29ec797580c077e6d6cb7410ba35204a38cf7fc9f0f6231d37262e4cc66b93318cdd065b0980016374ac9b52a53c1ba5977bda1115990c5d5c1a4acae06c3ef86a1fc5f8a8e9940f974e5d583abd4182c29d8b4747898a1708e02cf2b42baa28cfe868e9bbe4063b52208582669dfa83fac00369a744175bfc056fe291b5a2638a29582fcc89b9961e3607f1f84861f161a2e734e80f6bf2658f4b07e22242c0d712102f8a1a1086ce5706c8ffe4fb9bb3d1e7b2df930c0945faba291e4a2805f7ef9035aaced5c1a3435d5cb93b01be58c284d6c831c3cf37c5acffcaff40fa90c3f64b72d2f8434deeaa6047ba6dd89e4037d7ee0797928bebb1c2deb84a93d3467a7f578c7848f11f88e98fa6ac0adb65a5676ca03990564b03816fd387ae20749f8c1b56b5f8081d99167dc89fe139d80c408c3d46abab75c8f3d4e969077f7267bfba59d3fe9c174dbd40541e7cc31d6faeec0031afe3389731da439a48216ec66c5339983ea2096eb948869df4a1322c7346a949289c2f15feae69a9d3bc5fe4c7b767e21ac2e64ef2cad257c6ea45f0172812f22a1ebe19f5f97b223547bcf20ea669359965ed5ef3cdf3c5eb9ace020d265e72167c78c39d6b873b0b2670228e00715a90e735306274593625bada8a0c284b351eb7166927db6b40613fe38c3528a69b0dfb1d45a0038acffbf432c68e05930a87e3468ddb4577aad24008ea1a6100e5d2d580572c7e4d182325460a404d09f09801dcf96382952168af0d9c24c756f1a58279ae6844beb66cfcc123a919e71c7a5e76ffd48f626cbefc2f5a6c3f4473169542bc04e91ddaed6f6455762142fbcf69eca09233cc9348683c92ef6f64e7087b57495166fa8dd217a037b6627656d064d1563524dcb82ad2a78d35f3470dbdd53882bb3aca0f414e9671fa61c4c43f340db02f5e09cbc2e5b03d9900bc218a797c1653b33afde4d3d303399730813e7a91e0131f781c95d302b8bef12c99c53601fb2a3b660b36cc2adacad317cc56965718c11817bcc04f13095796e1e15355bf0862703d5ca103271775449498009d462527c3454aa70e056150a91519d8dfe90e8dc041135da327bac9ad6d0a2bcd8fa97576a7530f12b67cb40f22cb94db5f39b39f8353792b33e465568a26286b2e79796785b8462ff30c967c112b696809d6468efc3b0afe34064973d6d6ff0246049bbc33b0ae33eae4ac02998bedeef1d63039dfd76fad0ea4fe90a8f53d547fd9b825eda8ae46b62c530d176f5fedfee8d3fdc4bdf102dee81a7339f3b8339d2b56a4a4d28fb3b6562c5335c2605682caf1847c868edf555e2a99326c04c211aef1974e831f53994056732f6f2447e94b2899bc6cbdc7ff76fe683b5536f54cffaa94e539c795b1f29131b5328f3de549e39470dda705402a3269890c00116eb402dd9272a45df635bede7a2dfeeefb3af31a8930e575111288af1c2c9651a2877914fb4d3acec6b6ba3b08fef261fdf21eceaccd0eea9dc2a4ff444182aa4586151fdfe5935db8690d0bf1982146b0cf7c033781ac78f582122986990eaff6e51cbe39ce7b12e94e684a59a9ab80597382e9d456d5f43d2a32b6f3318cc9e85458c55a48867d49326b55814e77b702e71e76db59a56f6a5f463b2991cdd5ecd277366a83ba205d4a285ee65088faefa214737f9141f3092c776f4f042b4df714febe17c4efcb7245cd8f803be85c0c6214ec25209abf8b50a2cdc9ffd4f59d1e700451e73e6554346a4675f82b6e77073a74a426885d07ab5355f6f4669cee14a7ec6032c35743d92bef8b13867d28c2673ddb7645786030ccef60b8a890ce0e596b361e04e82dcf04b548e162974dcdc3e01f311a64a99089d2085f954979bf0b368b6c1c21f4f45986e1989742b3a8f6527c80e9ba742daea1a4f235686cd892c24ede8fb1ca462b27425f78f8bd83", 0x0, &(0x7f0000000140), &(0x7f0000001440)="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") 09:19:38 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="06f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 167.382431][T23739] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:1057: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 167.400079][T23739] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 167.400127][T23742] loop0: p4 size 2097152 extends beyond EOD, truncated [ 167.418653][T23747] tmpfs: Unknown parameter 'hash' 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xffffffda, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:38 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="05f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031425000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 167.482237][T23852] tmpfs: Unknown parameter 'hash' [ 167.499197][T23855] loop1: detected capacity change from 0 to 1 [ 167.505068][T23857] loop3: detected capacity change from 0 to 1 [ 167.524117][T23860] loop0: detected capacity change from 0 to 1 [ 167.528380][ T22] audit: type=1400 audit(1635499178.148:369): avc: denied { read } for pid=23861 comm="syz-executor.4" name="event0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 167.532569][ T4660] loop1: p2 < > p4 [ 167.553730][ T22] audit: type=1400 audit(1635499178.148:370): avc: denied { open } for pid=23861 comm="syz-executor.4" path="/dev/input/event0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 167.557928][ T4660] loop1: p2 size 2 extends beyond EOD, truncated [ 167.581907][ T22] audit: type=1400 audit(1635499178.148:371): avc: denied { ioctl } for pid=23861 comm="syz-executor.4" path="/dev/input/event0" dev="devtmpfs" ino=115 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 167.589330][ T4660] loop1: p4 size 2097152 extends beyond EOD, truncated [ 167.622226][ T5609] loop3: p2 < > p4 [ 167.626105][ T5609] loop3: p2 size 2 extends beyond EOD, truncated 09:19:38 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/76, 0xff0d}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f00000000c0)={[0x5]}, 0x8, 0x180800) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x11d8, 0x0, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x134, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xed, 0x3, "d8a01e02684542e55e49643f3b2043d94765455e95636d0cc55e9e0b3d4a2364049b2b7b43b31f23bf551efc10fc94317fe709d331a0d9fca75821ba04b889b47aeb83376cc04482ccdc20bfed46f224fc0b11369e2a0ea6f672133680981d1c11bf61dd524d657418d11b54c8cf123ef8ef5ad09fb5022ba2cf723d6c6e7b4f1d29503a60272d6b2cac6d847f3cc6777297f273d0583ff7906587b71e0874dfca3284e6eed8ce6ff0dfe2008dc6d1d8a8b769f2faa65b374d36942c080f68ae26411dca857417c42a0b77e10ef00bf6756ed44576c61562518fac394a1344a05ffadffce6fed0a0d7"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x83}, @TIPC_NLA_NODE_ID={0x2c, 0x3, "3071a0d4d031219b180a2105c24807a21b0243177b1548c7e334a21a415925331f9fc4e1be0093d6"}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffe01}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x63}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xdc58}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffeffff}]}, @TIPC_NLA_NODE={0x100c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x1004, 0x3, "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"}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2510}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80}]}]}, 0x11d8}, 0x1, 0x0, 0x0, 0x408e0}, 0x24000091) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='debugfs\x00', 0x0, &(0x7f0000000280)) [ 167.632954][ T5609] loop3: p4 size 2097152 extends beyond EOD, truncated [ 167.650122][ T380] loop0: p1 < > p2 < > p4 [ 167.654720][ T380] loop0: partition table partially beyond EOD, truncated [ 167.669740][T23855] loop1: p2 < > p4 [ 167.671385][T23857] loop3: p2 < > p4 [ 167.673764][T23855] loop1: p2 size 2 extends beyond EOD, 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfffffff0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 167.677379][T23857] loop3: p2 size 2 extends beyond EOD, [ 167.677384][T23855] truncated [ 167.677390][T23857] truncated [ 167.688577][T23857] loop3: p4 size 2097152 extends beyond EOD, truncated [ 167.702759][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 167.709329][T23855] loop1: p4 size 2097152 extends beyond EOD, truncated [ 167.709540][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 167.723114][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:38 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="07f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 167.731787][T23860] loop0: p1 < > p2 < > p4 [ 167.736220][T23860] loop0: partition table partially beyond EOD, truncated [ 167.760485][T23860] loop0: p1 start 335762607 is beyond EOD, truncated [ 167.767199][T23860] loop0: p2 size 2 extends beyond EOD, truncated [ 167.775115][T24168] tmpfs: Unknown parameter 'hash' 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:38 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x35, 0x7f, 0x0, 0x10000}, {0x24, 0x0, 0x5}, {0x6, 0x0, 0x0, 0x7fff7ffa}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f00000003c0)=[{0x6, 0x0, 0x0, 0x7fc02000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80082102, &(0x7f0000000200)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000040)={r2, 0x1, r0, 0x4}) 09:19:38 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="06f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 167.785054][T23860] loop0: p4 size 2097152 extends beyond EOD, truncated [ 167.795499][T24170] loop1: detected capacity change from 0 to 1 [ 167.809159][T24168] tmpfs: Unknown parameter 'hash' [ 167.815101][ T380] loop0: p1 < > p2 < > p4 [ 167.819551][ T380] loop0: partition table partially beyond EOD, truncated [ 167.825142][T24174] loop3: detected capacity change from 0 to 1 09:19:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x18de, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 167.829598][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 167.839510][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 167.849082][T24170] loop1: p2 < > p4 [ 167.852944][T24170] loop1: p2 size 2 extends beyond EOD, truncated [ 167.856213][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 167.860073][T24170] loop1: p4 size 2097152 extends beyond EOD, truncated [ 167.873596][T24174] loop3: p2 < > p4 [ 167.878210][T24174] loop3: p2 size 2 extends beyond EOD, truncated 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:38 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031448000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 167.885485][T24174] loop3: p4 size 2097152 extends beyond EOD, truncated [ 167.893996][T24178] tmpfs: Unknown parameter 'hash' [ 167.922103][T24178] tmpfs: Unknown parameter 'hash' 09:19:38 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="08f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="07f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 167.931981][T24208] loop0: detected capacity change from 0 to 1 09:19:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:38 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="06f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 167.961105][T24286] loop3: detected capacity change from 0 to 1 [ 167.965220][T24285] loop1: detected capacity change from 0 to 1 [ 167.987458][T24290] loop4: detected capacity change from 0 to 1 [ 167.988868][ T380] loop0: p1 < > p2 < > p4 [ 167.997253][T24286] loop3: p2 < > p4 [ 167.998009][ T380] loop0: partition table partially beyond EOD, truncated 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x8000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.002277][T24286] loop3: p2 size 2 extends beyond EOD, truncated [ 168.015699][T24286] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.023080][T24285] loop1: p2 < > p4 [ 168.024353][T24288] tmpfs: Unknown parameter 'hash' [ 168.027106][T24285] loop1: p2 size 2 extends beyond EOD, truncated [ 168.038545][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.041649][T24285] loop1: p4 size 2097152 extends beyond EOD, truncated [ 168.045371][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 168.059500][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 168.067662][T24208] loop0: p1 < > p2 < > p4 [ 168.068661][T24290] loop4: p2 < > p4 [ 168.072113][T24208] loop0: partition table partially beyond EOD, truncated [ 168.076008][T24290] loop4: p2 size 2 extends beyond EOD, truncated [ 168.083381][T24208] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.090013][T24290] loop4: p4 size 2097152 extends beyond EOD, [ 168.096031][T24208] loop0: p2 size 2 extends beyond EOD, truncated 09:19:38 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="08f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="09f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af5403144c000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 168.108905][T24290] truncated [ 168.109372][T24208] loop0: p4 size 2097152 extends beyond EOD, truncated [ 168.137322][ T380] loop0: p1 < > p2 < > p4 [ 168.141791][ T380] loop0: partition table partially beyond EOD, truncated 09:19:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.159750][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.166569][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 168.169298][T24297] loop1: detected capacity change from 0 to 1 [ 168.183931][T24295] loop3: detected capacity change from 0 to 1 [ 168.190573][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 168.199734][T24297] loop1: p2 < > p4 [ 168.205341][T24297] loop1: p2 size 2 extends beyond EOD, truncated 09:19:38 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c) socket$inet6_udplite(0xa, 0x2, 0x11) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x174, r1, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xcf6}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x12}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x6}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3f}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x29}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x29}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3ff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) 09:19:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.212430][T24297] loop1: p4 size 2097152 extends beyond EOD, truncated [ 168.220102][T24295] loop3: p2 < > p4 [ 168.224083][T24295] loop3: p2 size 2 extends beyond EOD, truncated [ 168.237975][T24295] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.247564][T24304] loop0: detected capacity change from 0 to 1 [ 168.248189][T24300] tmpfs: Unknown parameter 'hash' 09:19:38 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="09f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:38 executing program 4: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x2, 0x64, 0x3, 0x0, 0x0, {0x0, 0x0, 0xfffe}}, 0x14}}, 0x40) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x10900, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x3, 0x1, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x10000}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xde}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x4}, @CTA_MARK_MASK={0x8}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x4010}, 0x40080) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="fc010000020203000000000000000000050000020a000600512e39333100000070010a80240002800c00028005000100840000001400018008000100ac14141908000200ac1414aaa800028006000340000400002c0001801400030000000000000000000000ffff6401010114000400fe8800000000000000000000000000010c000280050001008400000006000340000300000c8005000100880000000600034003ff00000c000280050001008400000006000340800400002c00018014000300fe80000000000000000000000000001314000400fc01000000000000000000000000000006000340000400000800014000000000900002800c000280050001002f0000002c00018014000300fe8000000000000000000000000000aa14000400000000000000000000000000000000000c00028005000100210000000c000280050001002104000006000340000100001400018008000100ac1414bb080002000000000006000340000000000c00028005000100880000000c000280050001003a00000008000140000000000800044000000009640001800c00028005000100840000000c00028005000100000000000c00028005000100840000002c00018014000300fe80000000000000000000000000001f14000400ff020000000000000000000000000001060003400003000006000340000100001398d1d5be236aa298e82cd000f55816f26378504f94d05f00a8db700f1bd4169ebffa0000"], 0x1fc}}, 0x48880) [ 168.278676][T24304] loop0: p1 < > p2 < > p4 [ 168.283124][T24304] loop0: partition table partially beyond EOD, truncated [ 168.291855][T24300] tmpfs: Unknown parameter 'hash' [ 168.297382][T24304] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.304136][T24304] loop0: p2 size 2 extends beyond EOD, truncated 09:19:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) [ 168.335533][T24412] loop3: detected capacity change from 0 to 1 [ 168.342704][T24413] loop1: detected capacity change from 0 to 1 [ 168.347735][T24304] loop0: p4 size 2097152 extends beyond EOD, truncated [ 168.368652][T24412] loop3: p2 < > p4 [ 168.372581][T24412] loop3: p2 size 2 extends beyond EOD, truncated 09:19:39 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031454000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0af605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:39 executing program 4: setrlimit(0x9, &(0x7f0000000080)) r0 = syz_io_uring_setup(0x3899, &(0x7f0000000000), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f00006d6000/0x3000)=nil, &(0x7f0000ee9000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)) r4 = syz_open_pts(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4}, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000d60000/0x4000)=nil, 0x4000, 0x10, 0x6032, r0, 0x10000000) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_WRITEV={0x2, 0x5, 0x4004, @fd=r0, 0x80000000, &(0x7f0000000200)=[{&(0x7f0000000140)="3c563c9bbe33fdc05cc4c3c982846e4d1c81d5b18e3b2226e951a66940ec1f7332438cfba06939daf57ab69e11c2d9cbb510f6ec7238c99e77237f9b9e21852d1daf9f1a574348ce91d5e7011a152a318ec0afb9f3e33e933d9cd4028d0e4131b108f8260c49d0f2f589dbc08e0e2255e16d6b8550374eba75e0fdc8000162ada4e81ca690fc5e3986518b", 0x8b}], 0x1, 0x8, 0x1, {0x3, r6}}, 0x1ff) [ 168.379447][T24412] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.387955][T24440] tmpfs: Unknown parameter 'hash' [ 168.393638][T24413] loop1: p2 < > p4 [ 168.408393][T24413] loop1: p2 size 2 extends beyond EOD, truncated [ 168.429337][T24519] loop0: detected capacity change from 0 to 1 09:19:39 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x29d}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000729000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r3 = socket(0x2, 0x3, 0x9) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40001}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r6 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r4, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r5, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r10 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r8, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r9, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0x20}}, 0x0) bind(r4, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r8, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x1, 0x1, 0x1}}, 0x80) io_uring_enter(r0, 0x7ac4, 0x0, 0x0, 0x0, 0x0) [ 168.447985][T24521] loop3: detected capacity change from 0 to 1 [ 168.455301][T24413] loop1: p4 size 2097152 extends beyond EOD, truncated [ 168.468988][T24440] tmpfs: Unknown parameter 'hash' [ 168.488560][ T380] loop0: p1 < > p2 < > p4 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.489107][ T22] audit: type=1400 audit(1635499179.118:372): avc: denied { bind } for pid=24526 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 168.492995][ T380] loop0: partition table partially beyond EOD, truncated [ 168.493065][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.521213][T24521] loop3: p2 < > p4 [ 168.527518][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 168.528281][ T380] loop0: p4 size 2097152 extends beyond EOD, 09:19:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:39 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0bf605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 168.532523][T24521] loop3: p2 size 2 extends beyond EOD, [ 168.537664][ T380] truncated [ 168.552448][T24521] truncated [ 168.567955][ T380] loop0: p1 < > p2 < > p4 [ 168.568271][T24521] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.572408][ T380] loop0: partition table partially beyond EOD, truncated [ 168.578100][ T380] loop0: p1 start 335762607 is beyond EOD, truncated 09:19:39 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0bf605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.588153][T24599] loop1: detected capacity change from 0 to 1 [ 168.592979][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 168.607032][T24606] tmpfs: Unknown parameter 'hash' [ 168.612400][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated [ 168.620555][T24599] loop1: p2 < > p4 [ 168.629433][T24599] loop1: p2 size 2 extends beyond EOD, truncated 09:19:39 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000b80)=ANY=[]) open(0x0, 0x0, 0x60) open(&(0x7f0000000100)='./bus\x00', 0x1a181, 0x20) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f627573206d80000000000000002025207d7d28"], 0x1f) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@rand_addr=' \x01\x00', @in=@loopback, 0x4e22, 0x1000, 0x4e21, 0x6, 0xa, 0x0, 0x80, 0x1d, 0x0, 0xee00}, {0x137, 0x4, 0x1, 0x5, 0x800, 0x9, 0x100}, {0x8, 0x0, 0x0, 0x8}, 0x800, 0x6e6bb2, 0x0, 0x1, 0x0, 0x3}, {{@in6=@private0, 0x4d4, 0x3c}, 0x2, @in6=@empty, 0x3504, 0x2, 0x0, 0x20}}, 0xe8) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) chdir(&(0x7f00000001c0)='./file1\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) lseek(r3, 0x8, 0x4) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) [ 168.642297][T24599] loop1: p4 size 2097152 extends beyond EOD, truncated [ 168.647229][T24635] loop3: detected capacity change from 0 to 1 [ 168.658975][T24606] tmpfs: Unknown parameter 'hash' [ 168.664127][T24519] loop0: p1 < > p2 < > p4 [ 168.668606][T24519] loop0: partition table partially beyond EOD, truncated [ 168.673178][T24639] loop4: detected capacity change from 0 to 87 [ 168.676067][T24519] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.684231][ C0] sd 0:0:1:0: tag#6427 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 168.688508][T24519] loop0: p2 size 2 extends beyond EOD, truncated [ 168.698283][ C0] sd 0:0:1:0: tag#6427 CDB: opcode=0xe5 (vendor) [ 168.711073][ C0] sd 0:0:1:0: tag#6427 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 168.711410][T24635] loop3: p2 < > p4 [ 168.720151][ C0] sd 0:0:1:0: tag#6427 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 168.725471][T24635] loop3: p2 size 2 extends beyond EOD, truncated [ 168.733069][ C0] sd 0:0:1:0: tag#6427 CDB[20]: ba 09:19:39 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0cf605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 168.740186][T24519] loop0: p4 size 2097152 extends beyond EOD, truncated [ 168.757264][T24635] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.783223][ T380] loop3: p2 < > p4 [ 168.785625][T24714] loop1: detected capacity change from 0 to 1 [ 168.787323][ T380] loop3: p2 size 2 extends beyond EOD, truncated [ 168.800030][ T380] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.819167][T24714] loop1: p2 < > p4 [ 168.823667][T24714] loop1: p2 size 2 extends beyond EOD, truncated [ 168.834837][ T4668] udevd[4668]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory 09:19:39 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031455000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:39 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0cf605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) sendmsg$IPVS_CMD_ZERO(r5, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0x118, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010101}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0xfff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6062}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x8d0}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r6, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x70, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, r4, 0x1, 0x0, 0x0, {0x1b}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x2c, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_MAC={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40004}, 0x1) r9 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_TIOCOUTQ(r9, 0x5411, &(0x7f0000000680)) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@flushsa={0x1c, 0x1c, 0x100, 0x70bd2c, 0x25dfdbfc, {0x33}, [@replay_thresh={0x8, 0xb, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@mcast2={0xff, 0x2, '\x00', 0xc1}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x4000000, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x60, "bfd1a1b03ade071c1a1d6927aed6151bd27cba05b6afecaac27dbe8e6381afe8dcb5a76b"}}]}, 0x160}}, 0x0) 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.836456][T24714] loop1: p4 size 2097152 extends beyond EOD, truncated [ 168.862651][T24747] tmpfs: Unknown parameter 'hash' [ 168.864374][T24745] loop3: detected capacity change from 0 to 1 [ 168.889296][T24752] loop0: detected capacity change from 0 to 1 09:19:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:39 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0df605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 168.919607][T24745] loop3: p2 < > p4 [ 168.923823][T24745] loop3: p2 size 2 extends beyond EOD, truncated [ 168.930815][ T380] loop0: p1 < > p2 < > p4 [ 168.935326][ T380] loop0: partition table partially beyond EOD, truncated 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0xd03000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 168.961392][T24745] loop3: p4 size 2097152 extends beyond EOD, truncated [ 168.970775][ T380] loop0: p1 start 335762607 is beyond EOD, truncated [ 168.977536][ T380] loop0: p2 size 2 extends beyond EOD, truncated [ 168.989654][T24773] loop1: detected capacity change from 0 to 1 [ 168.996707][T24771] tmpfs: Unknown parameter 'hash' [ 169.000691][ T380] loop0: p4 size 2097152 extends beyond EOD, truncated 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1003000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 169.010451][T24752] loop0: p1 < > p2 < > p4 [ 169.014948][T24752] loop0: partition table partially beyond EOD, truncated [ 169.023098][T24752] loop0: p1 start 335762607 is beyond EOD, truncated [ 169.029838][T24752] loop0: p2 size 2 extends beyond EOD, truncated [ 169.037033][T24752] loop0: p4 size 2097152 extends beyond EOD, truncated [ 169.053069][T24773] loop1: p2 < > p4 09:19:39 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0df605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020206af54031460000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 169.057068][T24773] loop1: p2 size 2 extends beyond EOD, truncated [ 169.065012][T24771] tmpfs: Unknown parameter 'hash' [ 169.074819][T24773] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:39 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0ef605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1103000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 169.109869][T24835] loop0: detected capacity change from 0 to 1 [ 169.118563][T24815] loop3: detected capacity change from 0 to 1 [ 169.141670][T24888] tmpfs: Unknown parameter 'hash' [ 169.148612][ T5609] loop0: p1 < > p2 < > p4 [ 169.153077][ T5609] loop0: partition table partially beyond EOD, truncated 09:19:39 executing program 4: sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x804) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@crypto_settings=[@NL80211_ATTR_AKM_SUITES={0x4}], @NL80211_ATTR_HE_OBSS_PD={0xc, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xd4, r1, 0x900, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0xa0, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x52}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2a21440a}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1a4}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x240000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xb434}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xc65}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x4}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xffff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xa8c}]}]}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x77}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40801}, 0x8000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x15, 0x0, 0x0, 0xffff}, {0x24}, {0x6, 0x0, 0x0, 0x7fffffff}]}) gettid() [ 169.168698][T24815] loop3: p2 < > p4 [ 169.172668][T24815] loop3: p2 size 2 extends beyond EOD, truncated [ 169.172881][ T5609] loop0: p1 start 335762607 is beyond EOD, truncated [ 169.185788][ T5609] loop0: p2 size 2 extends beyond EOD, truncated [ 169.191099][T24892] loop1: detected capacity change from 0 to 1 [ 169.195526][ T5609] loop0: p4 size 2097152 extends beyond EOD, truncated [ 169.201101][T24815] loop3: p4 size 2097152 extends beyond EOD, truncated [ 169.212656][T24888] tmpfs: Unknown parameter 'hash' 09:19:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000180)) 09:19:39 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0ef605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 169.228547][T24835] loop0: p1 < > p2 < > p4 [ 169.233000][T24835] loop0: partition table partially beyond EOD, truncated [ 169.239028][T24892] loop1: p2 < > p4 [ 169.240601][T24835] loop0: p1 start 335762607 is beyond EOD, truncated [ 169.248801][T24892] loop1: p2 size 2 extends beyond EOD, truncated [ 169.250633][T24835] loop0: p2 size 2 extends beyond EOD, truncated [ 169.267113][T24892] loop1: p4 size 2097152 extends beyond EOD, truncated 09:19:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000180)={[], [{@hash}]}) 09:19:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003200), 0x0, 0x0) r1 = signalfd(r0, &(0x7f0000000000)={[0xf2d8]}, 0x8) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x4, 0x81, 0x1, 0xf9da, 0xa, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, 0x10, 0x80, 0x2, 0x8000}}) [ 169.273740][T24835] loop0: p4 size 2097152 extends beyond EOD, truncated [ 169.283797][T24930] tmpfs: Unknown parameter 'hash' [ 169.299600][T24940] loop3: detected capacity change from 0 to 1 09:19:39 executing program 1: creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="10f605020206af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:19:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x