T4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 102.320473][ T6864] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) 01:04:21 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r1, &(0x7f00000001c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 01:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 102.335238][ T6862] EXT4-fs (loop2): group descriptors corrupted! [ 102.352692][ T6864] EXT4-fs (loop3): group descriptors corrupted! 01:04:21 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(0x0, &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) [ 102.526366][ T6875] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 102.539037][ T6888] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 102.560298][ T6888] EXT4-fs (loop2): group descriptors corrupted! 01:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(0x0, &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 102.560660][ T6890] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: root inode unallocated [ 102.579621][ T6890] EXT4-fs (loop3): get root inode failed [ 102.589655][ T6890] EXT4-fs (loop3): mount failed 01:04:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:21 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r4, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 102.697943][ T6898] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 102.757868][ T6910] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 102.774997][ T6916] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 102.779338][ T6910] EXT4-fs (loop2): group descriptors corrupted! 01:04:22 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:22 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(0x0, &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) [ 103.367332][ T6928] EXT4-fs (loop1): unsupported descriptor size 0 [ 103.378296][ T6931] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 103.390999][ T6925] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: root inode unallocated [ 103.395070][ T6931] EXT4-fs (loop2): group descriptors corrupted! [ 103.406608][ T6925] EXT4-fs (loop3): get root inode failed 01:04:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:22 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) [ 103.415552][ T6925] EXT4-fs (loop3): mount failed 01:04:22 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 103.523935][ T6944] EXT4-fs (loop1): unsupported descriptor size 0 01:04:23 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:23 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:23 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:23 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:23 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 104.271797][ T6965] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 104.282069][ T6968] EXT4-fs (loop1): unsupported descriptor size 0 [ 104.282767][ T6965] EXT4-fs (loop2): group descriptors corrupted! [ 104.387987][ T6988] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 104.399783][ T6988] EXT4-fs (loop2): group descriptors corrupted! [ 104.406324][ T6978] EXT4-fs (loop1): unsupported descriptor size 0 01:04:24 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x0, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:24 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:24 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:24 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:24 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) [ 105.149334][ T7006] EXT4-fs (loop1): unsupported descriptor size 0 [ 105.156715][ T7004] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 105.166372][ T7004] EXT4-fs (loop2): group descriptors corrupted! [ 105.267275][ T7018] EXT4-fs (loop1): unsupported descriptor size 0 01:04:25 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x0, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:25 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:25 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:25 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:25 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) [ 105.993188][ T7039] EXT4-fs (loop1): unsupported descriptor size 0 [ 106.002461][ T7040] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 106.018741][ T7040] EXT4-fs (loop2): group descriptors corrupted! [ 106.036679][ T7051] EXT4-fs (loop1): unsupported descriptor size 0 01:04:25 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:25 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 106.169206][ T7055] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 106.190318][ T7055] EXT4-fs (loop2): group descriptors corrupted! 01:04:25 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x0, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:25 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:25 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:25 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, 0x0, 0x0) 01:04:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, 0x0, 0x0) [ 106.880068][ T7080] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 106.890020][ T7081] EXT4-fs (loop1): unsupported descriptor size 0 [ 106.897162][ T7080] EXT4-fs (loop2): group descriptors corrupted! 01:04:26 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:26 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, 0x0, 0x0) [ 107.015137][ T7091] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 107.041140][ T7091] EXT4-fs (loop2): group descriptors corrupted! 01:04:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x0, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 01:04:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:26 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:26 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r4, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 01:04:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 01:04:26 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r4, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:26 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 107.748911][ T7112] EXT4-fs (loop1): unsupported descriptor size 0 [ 107.757312][ T7118] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 107.772454][ T7118] EXT4-fs (loop2): group descriptors corrupted! [ 107.854319][ T7135] EXT4-fs (loop1): unsupported descriptor size 0 [ 107.868651][ T7137] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 107.887480][ T7137] EXT4-fs (loop2): re-mounted. Opts: (null) 01:04:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 01:04:27 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x0, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:27 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r4, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:27 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 01:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 01:04:27 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, 0x0) [ 108.633129][ T7148] EXT4-fs (loop1): unsupported descriptor size 0 [ 108.653369][ T7156] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 108.664995][ T7156] EXT4-fs (loop2): group descriptors corrupted! 01:04:27 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) [ 108.743633][ T7163] EXT4-fs (loop1): unsupported descriptor size 0 01:04:28 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x0, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:28 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:28 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, 0x0) 01:04:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:28 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, 0x0) 01:04:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 109.500928][ T7188] EXT4-fs (loop1): unsupported descriptor size 0 [ 109.507728][ T7189] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 109.518140][ T7189] EXT4-fs (loop2): group descriptors corrupted! 01:04:28 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 109.609856][ T7208] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 109.619984][ T7208] EXT4-fs (loop2): group descriptors corrupted! [ 109.631806][ T7211] EXT4-fs (loop1): unsupported descriptor size 0 01:04:29 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) 01:04:29 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, &(0x7f0000000540)) 01:04:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:29 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) 01:04:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) [ 110.346959][ T7220] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 110.356849][ T7225] EXT4-fs (loop1): unsupported descriptor size 0 [ 110.359642][ T7220] EXT4-fs (loop2): group descriptors corrupted! 01:04:29 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, &(0x7f0000000540)) 01:04:29 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 110.462496][ T7234] EXT4-fs (loop1): unsupported descriptor size 0 [ 110.532733][ T7246] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 110.545714][ T7246] EXT4-fs (loop2): group descriptors corrupted! 01:04:30 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x10, 0x5}]}, 0x30}}, 0x0) 01:04:30 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, &(0x7f0000000540)) 01:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:30 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:30 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:30 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 01:04:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 111.209924][ T7261] EXT4-fs (loop1): unsupported descriptor size 0 [ 111.223798][ T7259] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 111.234095][ T7259] EXT4-fs (loop2): group descriptors corrupted! [ 111.317099][ T7268] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 111.345782][ T7279] EXT4-fs (loop1): unsupported descriptor size 0 [ 111.345882][ T7281] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 111.361655][ T7268] EXT4-fs (loop5): mount failed 01:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 111.366738][ T7281] EXT4-fs (loop2): group descriptors corrupted! [ 111.512791][ T7286] EXT4-fs (loop1): unsupported descriptor size 0 01:04:31 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:31 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:31 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 01:04:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:31 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:31 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 01:04:31 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 112.069080][ T7294] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 112.083217][ T7301] EXT4-fs (loop1): unsupported descriptor size 0 [ 112.083473][ T7294] EXT4-fs (loop5): mount failed [ 112.096282][ T7300] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 112.105985][ T7300] EXT4-fs (loop2): group descriptors corrupted! 01:04:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 112.244824][ T7311] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 112.260844][ T7308] EXT4-fs (loop1): unsupported descriptor size 0 [ 112.265285][ T7311] EXT4-fs (loop2): group descriptors corrupted! [ 112.287974][ T7322] FAULT_INJECTION: forcing a failure. [ 112.287974][ T7322] name failslab, interval 1, probability 0, space 0, times 1 [ 112.300867][ T7322] CPU: 0 PID: 7322 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 112.310912][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.320943][ T7322] Call Trace: [ 112.324211][ T7322] dump_stack+0x1b0/0x21e [ 112.328546][ T7322] ? devkmsg_release+0x11c/0x11c [ 112.333466][ T7322] ? show_regs_print_info+0x12/0x12 [ 112.338655][ T7322] ? netlink_insert+0xb8f/0x1090 [ 112.343578][ T7322] ? __rcu_read_lock+0x50/0x50 [ 112.348314][ T7322] should_fail+0x6fb/0x860 [ 112.352721][ T7322] ? setup_fault_attr+0x2b0/0x2b0 [ 112.357724][ T7322] ? netlink_data_ready+0x10/0x10 [ 112.362721][ T7322] ? jhash+0x740/0x740 [ 112.366758][ T7322] ? netlink_hash+0xd0/0xd0 [ 112.371246][ T7322] ? __alloc_skb+0x88/0x4d0 [ 112.375724][ T7322] should_failslab+0x5/0x20 [ 112.380240][ T7322] kmem_cache_alloc+0x36/0x250 [ 112.385083][ T7322] ? unwind_get_return_address+0x48/0x90 [ 112.390685][ T7322] __alloc_skb+0x88/0x4d0 [ 112.394994][ T7322] ? netlink_autobind+0x163/0x190 [ 112.400101][ T7322] netlink_sendmsg+0x73b/0xd40 [ 112.404838][ T7322] ? netlink_getsockopt+0x8e0/0x8e0 [ 112.410009][ T7322] ? security_socket_sendmsg+0xad/0xc0 [ 112.415437][ T7322] ? netlink_getsockopt+0x8e0/0x8e0 [ 112.420622][ T7322] ____sys_sendmsg+0x56f/0x860 [ 112.425358][ T7322] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 112.430554][ T7322] __sys_sendmsg+0x26a/0x350 [ 112.435215][ T7322] ? ____sys_sendmsg+0x860/0x860 [ 112.440138][ T7322] ? fsnotify+0x13a0/0x1460 [ 112.444625][ T7322] ? __fsnotify_parent+0x300/0x300 [ 112.449707][ T7322] ? security_file_permission+0x128/0x300 [ 112.455400][ T7322] ? __sb_end_write+0xa4/0xf0 [ 112.460049][ T7322] ? vfs_write+0x427/0x4f0 [ 112.464436][ T7322] do_syscall_64+0xcb/0x150 [ 112.468911][ T7322] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.474799][ T7322] RIP: 0033:0x45de89 [ 112.478678][ T7322] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 112.498271][ T7322] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 112.506667][ T7322] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 112.514610][ T7322] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 112.522553][ T7322] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 112.530497][ T7322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.538458][ T7322] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c [ 112.641533][ T7324] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 112.650900][ T7324] EXT4-fs (loop2): group descriptors corrupted! 01:04:32 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(0xffffffffffffffff) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:32 executing program 5 (fault-call:4 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:32 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:32 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 112.975520][ T7335] EXT4-fs (loop1): unsupported descriptor size 0 [ 112.978760][ T7338] FAULT_INJECTION: forcing a failure. [ 112.978760][ T7338] name failslab, interval 1, probability 0, space 0, times 0 [ 112.985486][ T7337] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 112.997297][ T7338] CPU: 1 PID: 7338 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 113.004857][ T7337] EXT4-fs (loop2): group descriptors corrupted! [ 113.013814][ T7338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.013818][ T7338] Call Trace: [ 113.013835][ T7338] dump_stack+0x1b0/0x21e [ 113.013844][ T7338] ? devkmsg_release+0x11c/0x11c [ 113.013852][ T7338] ? show_regs_print_info+0x12/0x12 [ 113.013861][ T7338] ? netlink_insert+0xb8f/0x1090 [ 113.013870][ T7338] ? __rcu_read_lock+0x50/0x50 [ 113.013880][ T7338] should_fail+0x6fb/0x860 [ 113.013889][ T7338] ? setup_fault_attr+0x2b0/0x2b0 [ 113.013896][ T7338] ? netlink_data_ready+0x10/0x10 [ 113.013905][ T7338] ? jhash+0x740/0x740 [ 113.013912][ T7338] ? netlink_hash+0xd0/0xd0 [ 113.013921][ T7338] ? netlink_sendmsg+0x73b/0xd40 [ 113.013929][ T7338] should_failslab+0x5/0x20 [ 113.013938][ T7338] __kmalloc_track_caller+0x5d/0x2b0 [ 113.013946][ T7338] ? kmem_cache_alloc+0x1d5/0x250 [ 113.013955][ T7338] ? unwind_get_return_address+0x48/0x90 [ 113.013969][ T7338] ? netlink_sendmsg+0x73b/0xd40 [ 113.110500][ T7338] __alloc_skb+0xd1/0x4d0 [ 113.114815][ T7338] ? netlink_autobind+0x163/0x190 [ 113.119820][ T7338] netlink_sendmsg+0x73b/0xd40 [ 113.124566][ T7338] ? netlink_getsockopt+0x8e0/0x8e0 [ 113.129732][ T7338] ? security_socket_sendmsg+0xad/0xc0 [ 113.135185][ T7338] ? netlink_getsockopt+0x8e0/0x8e0 [ 113.140363][ T7338] ____sys_sendmsg+0x56f/0x860 [ 113.145097][ T7338] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 113.150264][ T7338] __sys_sendmsg+0x26a/0x350 [ 113.154833][ T7338] ? ____sys_sendmsg+0x860/0x860 [ 113.159741][ T7338] ? fsnotify+0x13a0/0x1460 [ 113.164306][ T7338] ? __fsnotify_parent+0x300/0x300 [ 113.169402][ T7338] ? security_file_permission+0x128/0x300 [ 113.175091][ T7338] ? __sb_end_write+0xa4/0xf0 [ 113.179751][ T7338] ? vfs_write+0x427/0x4f0 [ 113.184148][ T7338] do_syscall_64+0xcb/0x150 [ 113.189589][ T7338] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.195479][ T7338] RIP: 0033:0x45de89 [ 113.199345][ T7338] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:04:32 executing program 5 (fault-call:4 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 113.218922][ T7338] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.227316][ T7338] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 113.235356][ T7338] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 113.243311][ T7338] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 113.251266][ T7338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.259221][ T7338] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:32 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:32 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 113.308609][ T7348] FAULT_INJECTION: forcing a failure. [ 113.308609][ T7348] name failslab, interval 1, probability 0, space 0, times 0 [ 113.321396][ T7348] CPU: 1 PID: 7348 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 113.331600][ T7348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.341626][ T7348] Call Trace: [ 113.344897][ T7348] dump_stack+0x1b0/0x21e [ 113.349208][ T7348] ? devkmsg_release+0x11c/0x11c [ 113.354121][ T7348] ? unwind_next_frame+0x1c07/0x22b0 [ 113.359397][ T7348] ? show_regs_print_info+0x12/0x12 [ 113.364583][ T7348] should_fail+0x6fb/0x860 [ 113.368988][ T7348] ? setup_fault_attr+0x2b0/0x2b0 [ 113.374006][ T7348] ? memset+0x1f/0x40 [ 113.378064][ T7348] ? unwind_next_frame+0x1c07/0x22b0 [ 113.383371][ T7348] ? rtnl_newlink+0xff/0x1d90 [ 113.388018][ T7348] should_failslab+0x5/0x20 [ 113.392505][ T7348] kmem_cache_alloc_trace+0x39/0x270 [ 113.397763][ T7348] ? memset+0x1f/0x40 [ 113.401729][ T7348] ? rtnl_setlink+0x560/0x560 [ 113.406375][ T7348] rtnl_newlink+0xff/0x1d90 [ 113.410860][ T7348] ? arch_stack_walk+0x78/0xe0 [ 113.415607][ T7348] ? unwind_get_return_address_ptr+0x130/0x130 [ 113.421739][ T7348] ? stack_trace_save+0x1e0/0x1e0 [ 113.426746][ T7348] ? memset+0x1f/0x40 [ 113.430697][ T7348] ? rtnl_setlink+0x560/0x560 [ 113.435358][ T7348] ? memset+0x1f/0x40 [ 113.439399][ T7348] ? unwind_next_frame+0x1c07/0x22b0 [ 113.444689][ T7348] ? memset+0x1f/0x40 [ 113.448770][ T7348] ? unwind_next_frame+0x1c07/0x22b0 [ 113.454305][ T7348] ? arch_stack_walk+0x78/0xe0 [ 113.459064][ T7348] ? __rcu_read_lock+0x50/0x50 [ 113.463806][ T7348] ? __rcu_read_lock+0x50/0x50 [ 113.468546][ T7348] ? avc_has_perm_noaudit+0x36d/0x3f0 [ 113.473912][ T7348] ? avc_has_perm_noaudit+0x36d/0x3f0 [ 113.479265][ T7348] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 113.484605][ T7348] ? avc_denied+0x1c0/0x1c0 [ 113.489107][ T7348] ? memset+0x1f/0x40 [ 113.493074][ T7348] ? unwind_next_frame+0x1c07/0x22b0 [ 113.498330][ T7348] ? cred_has_capability+0x18c/0x3f0 [ 113.503586][ T7348] ? cred_has_capability+0x2b2/0x3f0 [ 113.508860][ T7348] ? selinux_perf_event_write+0x100/0x100 [ 113.514558][ T7348] ? unwind_get_return_address+0x48/0x90 [ 113.520188][ T7348] ? memset+0x1f/0x40 [ 113.524163][ T7348] ? unwind_next_frame+0x1c07/0x22b0 [ 113.529420][ T7348] ? cap_capable+0x23f/0x280 [ 113.533991][ T7348] ? cap_capable+0x23f/0x280 [ 113.538552][ T7348] ? mutex_lock+0xa6/0x110 [ 113.542939][ T7348] ? mutex_trylock+0xb0/0xb0 [ 113.547511][ T7348] ? security_capable+0xb1/0xd0 [ 113.552335][ T7348] ? rtnl_setlink+0x560/0x560 [ 113.556990][ T7348] rtnetlink_rcv_msg+0x936/0xc20 [ 113.561902][ T7348] ? is_bpf_text_address+0x290/0x2b0 [ 113.567345][ T7348] ? rtnetlink_bind+0x80/0x80 [ 113.571998][ T7348] ? unwind_get_return_address+0x48/0x90 [ 113.577612][ T7348] ? arch_stack_walk+0x98/0xe0 [ 113.582374][ T7348] ? stack_trace_save+0x111/0x1e0 [ 113.587385][ T7348] ? avc_has_perm+0xbd/0x260 [ 113.591965][ T7348] ? stack_trace_snprint+0x150/0x150 [ 113.597230][ T7348] ? _raw_spin_lock_bh+0xa4/0x180 [ 113.602248][ T7348] ? rhashtable_jhash2+0x1cf/0x2f0 [ 113.607339][ T7348] ? jhash+0x740/0x740 [ 113.611383][ T7348] ? rht_key_hashfn+0x157/0x240 [ 113.616227][ T7348] ? deferred_put_nlk_sk+0x210/0x210 [ 113.621571][ T7348] ? netlink_sendmsg+0x73b/0xd40 [ 113.626485][ T7348] ? jhash+0x740/0x740 [ 113.630538][ T7348] ? netlink_hash+0xd0/0xd0 [ 113.635025][ T7348] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.641074][ T7348] ? _raw_spin_lock_irq+0x180/0x180 [ 113.646249][ T7348] ? __rcu_read_lock+0x50/0x50 [ 113.651061][ T7348] netlink_rcv_skb+0x1f0/0x460 [ 113.655800][ T7348] ? rtnetlink_bind+0x80/0x80 [ 113.660469][ T7348] ? netlink_ack+0xa90/0xa90 [ 113.665039][ T7348] ? __rcu_read_lock+0x50/0x50 [ 113.669775][ T7348] ? selinux_vm_enough_memory+0x160/0x160 [ 113.675507][ T7348] ? setup_fault_attr+0x2b0/0x2b0 [ 113.680542][ T7348] ? netlink_trim+0x10a/0x230 [ 113.685189][ T7348] netlink_unicast+0x87c/0xa20 [ 113.689939][ T7348] ? netlink_detachskb+0x60/0x60 [ 113.694846][ T7348] ? __virt_addr_valid+0x1fd/0x290 [ 113.700453][ T7348] netlink_sendmsg+0x9a7/0xd40 [ 113.705203][ T7348] ? netlink_getsockopt+0x8e0/0x8e0 [ 113.710414][ T7348] ? security_socket_sendmsg+0xad/0xc0 [ 113.715860][ T7348] ? netlink_getsockopt+0x8e0/0x8e0 [ 113.721043][ T7348] ____sys_sendmsg+0x56f/0x860 [ 113.725793][ T7348] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 113.730960][ T7348] __sys_sendmsg+0x26a/0x350 [ 113.735520][ T7348] ? ____sys_sendmsg+0x860/0x860 [ 113.740433][ T7348] ? fsnotify+0x13a0/0x1460 [ 113.744914][ T7348] ? __fsnotify_parent+0x300/0x300 [ 113.750021][ T7348] ? security_file_permission+0x128/0x300 [ 113.755731][ T7348] ? __sb_end_write+0xa4/0xf0 [ 113.760378][ T7348] ? vfs_write+0x427/0x4f0 [ 113.764766][ T7348] do_syscall_64+0xcb/0x150 [ 113.769241][ T7348] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.775110][ T7348] RIP: 0033:0x45de89 [ 113.778986][ T7348] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 113.798583][ T7348] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:04:32 executing program 5 (fault-call:4 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:32 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(0xffffffffffffffff) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 113.806978][ T7348] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 113.814936][ T7348] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 113.822893][ T7348] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 113.830858][ T7348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.838810][ T7348] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 113.878498][ T7349] EXT4-fs (loop1): unsupported descriptor size 0 [ 113.902718][ T7358] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 113.913007][ T7363] FAULT_INJECTION: forcing a failure. [ 113.913007][ T7363] name failslab, interval 1, probability 0, space 0, times 0 [ 113.914136][ T7358] EXT4-fs (loop2): group descriptors corrupted! [ 113.927090][ T7363] CPU: 1 PID: 7363 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 113.942030][ T7363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.952076][ T7363] Call Trace: [ 113.955353][ T7363] dump_stack+0x1b0/0x21e [ 113.959667][ T7363] ? devkmsg_release+0x11c/0x11c [ 113.964586][ T7363] ? show_regs_print_info+0x12/0x12 [ 113.969762][ T7363] ? memset+0x1f/0x40 [ 113.973815][ T7363] ? unwind_next_frame+0x1c07/0x22b0 [ 113.979077][ T7363] should_fail+0x6fb/0x860 [ 113.983484][ T7363] ? setup_fault_attr+0x2b0/0x2b0 [ 113.988479][ T7363] ? fib_sync_up+0x5e9/0x680 [ 113.993076][ T7363] ? __rcu_read_lock+0x50/0x50 [ 113.997811][ T7363] ? __alloc_skb+0x88/0x4d0 [ 114.002287][ T7363] should_failslab+0x5/0x20 [ 114.006767][ T7363] kmem_cache_alloc+0x36/0x250 [ 114.011613][ T7363] __alloc_skb+0x88/0x4d0 [ 114.015936][ T7363] rtmsg_ifinfo_build_skb+0x81/0x180 [ 114.021225][ T7363] rtmsg_ifinfo+0x73/0x120 [ 114.025621][ T7363] netdev_state_change+0x157/0x200 [ 114.030706][ T7363] ? netdev_features_change+0x140/0x140 [ 114.036261][ T7363] ? unwind_get_return_address+0x48/0x90 [ 114.041875][ T7363] ? arch_stack_walk+0x98/0xe0 [ 114.046614][ T7363] ? validate_linkmsg+0x392/0x490 [ 114.051613][ T7363] do_setlink+0x2c8/0x3a90 [ 114.056006][ T7363] ? rtnetlink_event+0x1b0/0x1b0 [ 114.060927][ T7363] ? __kasan_kmalloc+0x179/0x1b0 [ 114.065863][ T7363] ? __kasan_kmalloc+0x117/0x1b0 [ 114.070772][ T7363] ? kmem_cache_alloc_trace+0xc3/0x270 [ 114.076211][ T7363] ? rtnl_newlink+0xff/0x1d90 [ 114.080854][ T7363] ? rtnetlink_rcv_msg+0x936/0xc20 [ 114.085932][ T7363] ? netlink_rcv_skb+0x1f0/0x460 [ 114.090853][ T7363] ? netlink_unicast+0x87c/0xa20 [ 114.095771][ T7363] ? netlink_sendmsg+0x9a7/0xd40 [ 114.100689][ T7363] ? ____sys_sendmsg+0x56f/0x860 [ 114.105604][ T7363] ? __sys_sendmsg+0x26a/0x350 [ 114.110335][ T7363] ? do_syscall_64+0xcb/0x150 [ 114.114986][ T7363] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.121024][ T7363] ? unwind_next_frame+0x1c07/0x22b0 [ 114.126290][ T7363] ? __nla_validate_parse+0x18fd/0x2010 [ 114.131820][ T7363] ? __nla_validate+0x50/0x50 [ 114.136484][ T7363] ? setup_fault_attr+0x2b0/0x2b0 [ 114.141490][ T7363] ? memset+0x1f/0x40 [ 114.145468][ T7363] ? unwind_next_frame+0x1c07/0x22b0 [ 114.150735][ T7363] ? rtnl_newlink+0xff/0x1d90 [ 114.155378][ T7363] rtnl_newlink+0x1240/0x1d90 [ 114.160032][ T7363] ? rtnl_setlink+0x560/0x560 [ 114.164685][ T7363] ? memset+0x1f/0x40 [ 114.168683][ T7363] ? unwind_next_frame+0x1c07/0x22b0 [ 114.173937][ T7363] ? memset+0x1f/0x40 [ 114.177889][ T7363] ? unwind_next_frame+0x1c07/0x22b0 [ 114.183153][ T7363] ? arch_stack_walk+0x78/0xe0 [ 114.188338][ T7363] ? __rcu_read_lock+0x50/0x50 [ 114.193071][ T7363] ? __rcu_read_lock+0x50/0x50 [ 114.197811][ T7363] ? memset+0x1f/0x40 [ 114.201782][ T7363] ? unwind_next_frame+0x1c07/0x22b0 [ 114.207045][ T7363] ? cap_capable+0x23f/0x280 [ 114.211604][ T7363] ? cap_capable+0x23f/0x280 [ 114.216176][ T7363] ? mutex_lock+0xa6/0x110 [ 114.220562][ T7363] ? mutex_trylock+0xb0/0xb0 [ 114.225124][ T7363] ? security_capable+0xb1/0xd0 [ 114.229954][ T7363] ? rtnl_setlink+0x560/0x560 [ 114.234608][ T7363] rtnetlink_rcv_msg+0x936/0xc20 [ 114.239514][ T7363] ? is_bpf_text_address+0x290/0x2b0 [ 114.244767][ T7363] ? rtnetlink_bind+0x80/0x80 [ 114.249413][ T7363] ? unwind_get_return_address+0x48/0x90 [ 114.255034][ T7363] ? arch_stack_walk+0x98/0xe0 [ 114.259775][ T7363] ? stack_trace_save+0x111/0x1e0 [ 114.264772][ T7363] ? avc_has_perm+0xbd/0x260 [ 114.269332][ T7363] ? stack_trace_snprint+0x150/0x150 [ 114.274601][ T7363] ? _raw_spin_lock_bh+0xa4/0x180 [ 114.279597][ T7363] ? rhashtable_jhash2+0x1cf/0x2f0 [ 114.284677][ T7363] ? jhash+0x740/0x740 [ 114.288713][ T7363] ? rht_key_hashfn+0x157/0x240 [ 114.293543][ T7363] ? deferred_put_nlk_sk+0x210/0x210 [ 114.298812][ T7363] ? netlink_sendmsg+0x73b/0xd40 [ 114.303747][ T7363] ? jhash+0x740/0x740 [ 114.307797][ T7363] ? netlink_hash+0xd0/0xd0 [ 114.312802][ T7363] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.318858][ T7363] ? _raw_spin_lock_irq+0x180/0x180 [ 114.324035][ T7363] ? __rcu_read_lock+0x50/0x50 [ 114.328773][ T7363] netlink_rcv_skb+0x1f0/0x460 [ 114.333522][ T7363] ? rtnetlink_bind+0x80/0x80 [ 114.338178][ T7363] ? netlink_ack+0xa90/0xa90 [ 114.342746][ T7363] ? __rcu_read_lock+0x50/0x50 [ 114.347495][ T7363] ? selinux_vm_enough_memory+0x160/0x160 [ 114.353196][ T7363] ? setup_fault_attr+0x2b0/0x2b0 [ 114.358195][ T7363] ? netlink_trim+0x10a/0x230 [ 114.362843][ T7363] netlink_unicast+0x87c/0xa20 [ 114.367626][ T7363] ? netlink_detachskb+0x60/0x60 [ 114.372535][ T7363] ? __virt_addr_valid+0x1fd/0x290 [ 114.377628][ T7363] netlink_sendmsg+0x9a7/0xd40 [ 114.382381][ T7363] ? netlink_getsockopt+0x8e0/0x8e0 [ 114.387560][ T7363] ? security_socket_sendmsg+0xad/0xc0 [ 114.393004][ T7363] ? netlink_getsockopt+0x8e0/0x8e0 [ 114.398198][ T7363] ____sys_sendmsg+0x56f/0x860 [ 114.403635][ T7363] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 114.408963][ T7363] __sys_sendmsg+0x26a/0x350 [ 114.413545][ T7363] ? ____sys_sendmsg+0x860/0x860 [ 114.418505][ T7363] ? fsnotify+0x13a0/0x1460 [ 114.423066][ T7363] ? __fsnotify_parent+0x300/0x300 [ 114.428145][ T7363] ? security_file_permission+0x128/0x300 [ 114.433832][ T7363] ? __sb_end_write+0xa4/0xf0 [ 114.438616][ T7363] ? vfs_write+0x427/0x4f0 [ 114.443066][ T7363] do_syscall_64+0xcb/0x150 [ 114.447543][ T7363] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.453416][ T7363] RIP: 0033:0x45de89 [ 114.457291][ T7363] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:04:33 executing program 5 (fault-call:4 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:33 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 114.476893][ T7363] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.485293][ T7363] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 114.493282][ T7363] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 114.501241][ T7363] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 114.509191][ T7363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 114.517500][ T7363] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:33 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:33 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 114.572355][ T7364] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 114.597572][ T7377] FAULT_INJECTION: forcing a failure. [ 114.597572][ T7377] name failslab, interval 1, probability 0, space 0, times 0 [ 114.610750][ T7377] CPU: 0 PID: 7377 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 114.620830][ T7377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.630883][ T7377] Call Trace: [ 114.634176][ T7377] dump_stack+0x1b0/0x21e [ 114.638497][ T7377] ? devkmsg_release+0x11c/0x11c [ 114.643408][ T7377] ? show_regs_print_info+0x12/0x12 [ 114.648590][ T7377] ? memset+0x1f/0x40 [ 114.652558][ T7377] ? unwind_next_frame+0x1c07/0x22b0 [ 114.657822][ T7377] should_fail+0x6fb/0x860 [ 114.662238][ T7377] ? setup_fault_attr+0x2b0/0x2b0 [ 114.667242][ T7377] ? fib_sync_up+0x5e9/0x680 [ 114.671810][ T7377] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 114.677242][ T7377] should_failslab+0x5/0x20 [ 114.681823][ T7377] __kmalloc_track_caller+0x5d/0x2b0 [ 114.687093][ T7377] ? kmem_cache_alloc+0x1d5/0x250 [ 114.692090][ T7377] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 114.697519][ T7377] __alloc_skb+0xd1/0x4d0 [ 114.701825][ T7377] rtmsg_ifinfo_build_skb+0x81/0x180 [ 114.707085][ T7377] rtmsg_ifinfo+0x73/0x120 [ 114.711495][ T7377] netdev_state_change+0x157/0x200 [ 114.716674][ T7377] ? netdev_features_change+0x140/0x140 [ 114.722418][ T7377] ? unwind_get_return_address+0x48/0x90 [ 114.728063][ T7377] ? arch_stack_walk+0x98/0xe0 [ 114.734543][ T7377] ? validate_linkmsg+0x392/0x490 [ 114.739541][ T7377] do_setlink+0x2c8/0x3a90 [ 114.743928][ T7377] ? switch_mm+0xe0/0xe0 [ 114.748162][ T7377] ? rtnetlink_event+0x1b0/0x1b0 [ 114.753084][ T7377] ? __kasan_kmalloc+0x179/0x1b0 [ 114.757991][ T7377] ? __kasan_kmalloc+0x117/0x1b0 [ 114.762905][ T7377] ? kmem_cache_alloc_trace+0xc3/0x270 [ 114.768331][ T7377] ? rtnl_newlink+0xff/0x1d90 [ 114.772980][ T7377] ? rtnetlink_rcv_msg+0x936/0xc20 [ 114.778065][ T7377] ? netlink_rcv_skb+0x1f0/0x460 [ 114.782990][ T7377] ? netlink_unicast+0x87c/0xa20 [ 114.787902][ T7377] ? netlink_sendmsg+0x9a7/0xd40 [ 114.792807][ T7377] ? ____sys_sendmsg+0x56f/0x860 [ 114.797717][ T7377] ? __sys_sendmsg+0x26a/0x350 [ 114.802449][ T7377] ? do_syscall_64+0xcb/0x150 [ 114.807103][ T7377] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.813143][ T7377] ? __nla_validate_parse+0x18fd/0x2010 [ 114.818677][ T7377] ? __nla_validate+0x50/0x50 [ 114.823341][ T7377] ? setup_fault_attr+0x2b0/0x2b0 [ 114.828359][ T7377] ? memset+0x1f/0x40 [ 114.832323][ T7377] ? unwind_next_frame+0x1c07/0x22b0 [ 114.837589][ T7377] ? rtnl_newlink+0xff/0x1d90 [ 114.842251][ T7377] rtnl_newlink+0x1240/0x1d90 [ 114.846899][ T7377] ? rtnl_setlink+0x560/0x560 [ 114.851564][ T7377] ? memset+0x1f/0x40 [ 114.855517][ T7377] ? unwind_next_frame+0x1c07/0x22b0 [ 114.860772][ T7377] ? memset+0x1f/0x40 [ 114.864725][ T7377] ? unwind_next_frame+0x1c07/0x22b0 [ 114.869988][ T7377] ? arch_stack_walk+0x78/0xe0 [ 114.874727][ T7377] ? __rcu_read_lock+0x50/0x50 [ 114.879474][ T7377] ? __rcu_read_lock+0x50/0x50 [ 114.884234][ T7377] ? memset+0x1f/0x40 [ 114.888200][ T7377] ? unwind_next_frame+0x1c07/0x22b0 [ 114.893467][ T7377] ? cap_capable+0x23f/0x280 [ 114.898027][ T7377] ? cap_capable+0x23f/0x280 [ 114.902600][ T7377] ? mutex_lock+0xa6/0x110 [ 114.906997][ T7377] ? mutex_trylock+0xb0/0xb0 [ 114.911562][ T7377] ? security_capable+0xb1/0xd0 [ 114.916486][ T7377] ? rtnl_setlink+0x560/0x560 [ 114.921157][ T7377] rtnetlink_rcv_msg+0x936/0xc20 [ 114.926070][ T7377] ? is_bpf_text_address+0x290/0x2b0 [ 114.931328][ T7377] ? rtnetlink_bind+0x80/0x80 [ 114.936022][ T7377] ? unwind_get_return_address+0x48/0x90 [ 114.941653][ T7377] ? arch_stack_walk+0x98/0xe0 [ 114.946439][ T7377] ? stack_trace_save+0x111/0x1e0 [ 114.951444][ T7377] ? avc_has_perm+0xbd/0x260 [ 114.956006][ T7377] ? stack_trace_snprint+0x150/0x150 [ 114.961263][ T7377] ? _raw_spin_lock_bh+0xa4/0x180 [ 114.966278][ T7377] ? rhashtable_jhash2+0x1cf/0x2f0 [ 114.971377][ T7377] ? jhash+0x740/0x740 [ 114.975443][ T7377] ? rht_key_hashfn+0x157/0x240 [ 114.980279][ T7377] ? deferred_put_nlk_sk+0x210/0x210 [ 114.985552][ T7377] ? netlink_sendmsg+0x73b/0xd40 [ 114.990478][ T7377] ? jhash+0x740/0x740 [ 114.994531][ T7377] ? netlink_hash+0xd0/0xd0 [ 114.999002][ T7377] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.005034][ T7377] ? _raw_spin_lock_irq+0x180/0x180 [ 115.010220][ T7377] ? __rcu_read_lock+0x50/0x50 [ 115.014984][ T7377] netlink_rcv_skb+0x1f0/0x460 [ 115.019732][ T7377] ? rtnetlink_bind+0x80/0x80 [ 115.024396][ T7377] ? netlink_ack+0xa90/0xa90 [ 115.028969][ T7377] ? __rcu_read_lock+0x50/0x50 [ 115.033726][ T7377] ? selinux_vm_enough_memory+0x160/0x160 [ 115.039417][ T7377] ? setup_fault_attr+0x2b0/0x2b0 [ 115.044485][ T7377] ? netlink_trim+0x10a/0x230 [ 115.049288][ T7377] netlink_unicast+0x87c/0xa20 [ 115.054073][ T7377] ? netlink_detachskb+0x60/0x60 [ 115.059155][ T7377] ? __virt_addr_valid+0x1fd/0x290 [ 115.064363][ T7377] netlink_sendmsg+0x9a7/0xd40 [ 115.069127][ T7377] ? netlink_getsockopt+0x8e0/0x8e0 [ 115.074295][ T7377] ? security_socket_sendmsg+0xad/0xc0 [ 115.079738][ T7377] ? netlink_getsockopt+0x8e0/0x8e0 [ 115.086128][ T7377] ____sys_sendmsg+0x56f/0x860 [ 115.090878][ T7377] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 115.096046][ T7377] __sys_sendmsg+0x26a/0x350 [ 115.100606][ T7377] ? ____sys_sendmsg+0x860/0x860 [ 115.105523][ T7377] ? fsnotify+0x13a0/0x1460 [ 115.110000][ T7377] ? __fsnotify_parent+0x300/0x300 [ 115.115094][ T7377] ? security_file_permission+0x128/0x300 [ 115.121571][ T7377] ? __sb_end_write+0xa4/0xf0 [ 115.126230][ T7377] ? vfs_write+0x427/0x4f0 [ 115.130634][ T7377] do_syscall_64+0xcb/0x150 [ 115.135112][ T7377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.140974][ T7377] RIP: 0033:0x45de89 [ 115.144837][ T7377] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 115.164419][ T7377] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:04:34 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(0xffffffffffffffff) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 115.172818][ T7377] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 115.184597][ T7377] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 115.192567][ T7377] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 115.200537][ T7377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 115.208495][ T7377] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:34 executing program 5 (fault-call:4 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:34 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 115.270825][ T7385] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 115.298681][ T7391] FAULT_INJECTION: forcing a failure. [ 115.298681][ T7391] name failslab, interval 1, probability 0, space 0, times 0 01:04:34 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) [ 115.311884][ T7391] CPU: 1 PID: 7391 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 115.321927][ T7391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.331967][ T7391] Call Trace: [ 115.335237][ T7391] dump_stack+0x1b0/0x21e [ 115.339539][ T7391] ? devkmsg_release+0x11c/0x11c [ 115.344463][ T7391] ? __kasan_kmalloc+0x179/0x1b0 [ 115.349377][ T7391] ? show_regs_print_info+0x12/0x12 [ 115.354561][ T7391] ? __kmalloc_track_caller+0x201/0x2b0 [ 115.360174][ T7391] ? __alloc_skb+0xd1/0x4d0 [ 115.364658][ T7391] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 115.370551][ T7391] ? rtnetlink_rcv_msg+0x930/0xc20 [ 115.375638][ T7391] should_fail+0x6fb/0x860 [ 115.380047][ T7391] ? setup_fault_attr+0x2b0/0x2b0 [ 115.385050][ T7391] ? netlink_trim+0x195/0x230 [ 115.389722][ T7391] should_failslab+0x5/0x20 [ 115.394249][ T7391] __kmalloc_track_caller+0x5d/0x2b0 [ 115.399658][ T7391] ? netlink_trim+0x195/0x230 [ 115.404321][ T7391] pskb_expand_head+0x10d/0xfb0 [ 115.409148][ T7391] ? fib_sync_up+0x5e9/0x680 [ 115.413720][ T7391] netlink_trim+0x195/0x230 [ 115.418199][ T7391] netlink_broadcast_filtered+0x6d/0x10c0 [ 115.423891][ T7391] ? rtmsg_ifinfo_build_skb+0xe2/0x180 [ 115.429330][ T7391] ? rtmsg_ifinfo_build_skb+0xfa/0x180 [ 115.434761][ T7391] nlmsg_notify+0xa6/0x150 [ 115.439174][ T7391] netdev_state_change+0x157/0x200 [ 115.444267][ T7391] ? netdev_features_change+0x140/0x140 [ 115.449812][ T7391] ? unwind_get_return_address+0x48/0x90 [ 115.455445][ T7391] ? arch_stack_walk+0x98/0xe0 [ 115.460183][ T7391] ? validate_linkmsg+0x392/0x490 [ 115.465189][ T7391] do_setlink+0x2c8/0x3a90 [ 115.469605][ T7391] ? rtnetlink_event+0x1b0/0x1b0 [ 115.474519][ T7391] ? __kasan_kmalloc+0x179/0x1b0 [ 115.479434][ T7391] ? __kasan_kmalloc+0x117/0x1b0 [ 115.484367][ T7391] ? kmem_cache_alloc_trace+0xc3/0x270 [ 115.489813][ T7391] ? rtnl_newlink+0xff/0x1d90 [ 115.494461][ T7391] ? rtnetlink_rcv_msg+0x936/0xc20 [ 115.499548][ T7391] ? netlink_rcv_skb+0x1f0/0x460 [ 115.504499][ T7391] ? netlink_unicast+0x87c/0xa20 [ 115.509441][ T7391] ? netlink_sendmsg+0x9a7/0xd40 [ 115.514376][ T7391] ? ____sys_sendmsg+0x56f/0x860 [ 115.519288][ T7391] ? __sys_sendmsg+0x26a/0x350 [ 115.524024][ T7391] ? do_syscall_64+0xcb/0x150 [ 115.528672][ T7391] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.534729][ T7391] ? unwind_next_frame+0x1c07/0x22b0 [ 115.540004][ T7391] ? __nla_validate_parse+0x18fd/0x2010 [ 115.545522][ T7391] ? __nla_validate+0x50/0x50 [ 115.550207][ T7391] ? setup_fault_attr+0x2b0/0x2b0 [ 115.555244][ T7391] ? memset+0x1f/0x40 [ 115.559199][ T7391] ? unwind_next_frame+0x1c07/0x22b0 [ 115.564473][ T7391] ? rtnl_newlink+0xff/0x1d90 [ 115.569119][ T7391] rtnl_newlink+0x1240/0x1d90 [ 115.573767][ T7391] ? rtnl_setlink+0x560/0x560 [ 115.578435][ T7391] ? memset+0x1f/0x40 [ 115.582402][ T7391] ? unwind_next_frame+0x1c07/0x22b0 [ 115.587719][ T7391] ? memset+0x1f/0x40 [ 115.591700][ T7391] ? unwind_next_frame+0x1c07/0x22b0 [ 115.596980][ T7391] ? arch_stack_walk+0x78/0xe0 [ 115.601715][ T7391] ? __rcu_read_lock+0x50/0x50 [ 115.606476][ T7391] ? __rcu_read_lock+0x50/0x50 [ 115.611254][ T7391] ? memset+0x1f/0x40 [ 115.616787][ T7391] ? unwind_next_frame+0x1c07/0x22b0 [ 115.622058][ T7391] ? cap_capable+0x23f/0x280 [ 115.626638][ T7391] ? cap_capable+0x23f/0x280 [ 115.631204][ T7391] ? mutex_lock+0xa6/0x110 [ 115.635595][ T7391] ? mutex_trylock+0xb0/0xb0 [ 115.640180][ T7391] ? security_capable+0xb1/0xd0 [ 115.645046][ T7391] ? rtnl_setlink+0x560/0x560 [ 115.649719][ T7391] rtnetlink_rcv_msg+0x936/0xc20 [ 115.654642][ T7391] ? is_bpf_text_address+0x290/0x2b0 [ 115.659909][ T7391] ? rtnetlink_bind+0x80/0x80 [ 115.664555][ T7391] ? unwind_get_return_address+0x48/0x90 [ 115.670161][ T7391] ? arch_stack_walk+0x98/0xe0 [ 115.674899][ T7391] ? stack_trace_save+0x111/0x1e0 [ 115.679909][ T7391] ? avc_has_perm+0xbd/0x260 [ 115.684486][ T7391] ? stack_trace_snprint+0x150/0x150 [ 115.689756][ T7391] ? _raw_spin_lock_bh+0xa4/0x180 [ 115.694765][ T7391] ? rhashtable_jhash2+0x1cf/0x2f0 [ 115.699844][ T7391] ? jhash+0x740/0x740 [ 115.703882][ T7391] ? rht_key_hashfn+0x157/0x240 [ 115.708702][ T7391] ? deferred_put_nlk_sk+0x210/0x210 [ 115.713971][ T7391] ? netlink_sendmsg+0x73b/0xd40 [ 115.718892][ T7391] ? jhash+0x740/0x740 [ 115.722928][ T7391] ? netlink_hash+0xd0/0xd0 [ 115.727399][ T7391] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.733434][ T7391] ? _raw_spin_lock_irq+0x180/0x180 [ 115.738623][ T7391] ? __rcu_read_lock+0x50/0x50 [ 115.743358][ T7391] netlink_rcv_skb+0x1f0/0x460 [ 115.748094][ T7391] ? rtnetlink_bind+0x80/0x80 [ 115.752761][ T7391] ? netlink_ack+0xa90/0xa90 [ 115.757324][ T7391] ? __rcu_read_lock+0x50/0x50 [ 115.762063][ T7391] ? selinux_vm_enough_memory+0x160/0x160 [ 115.767777][ T7391] ? setup_fault_attr+0x2b0/0x2b0 [ 115.772779][ T7391] ? netlink_trim+0x10a/0x230 [ 115.777432][ T7391] netlink_unicast+0x87c/0xa20 [ 115.782176][ T7391] ? netlink_detachskb+0x60/0x60 [ 115.787093][ T7391] ? __virt_addr_valid+0x1fd/0x290 [ 115.792203][ T7391] netlink_sendmsg+0x9a7/0xd40 [ 115.796943][ T7391] ? netlink_getsockopt+0x8e0/0x8e0 [ 115.802221][ T7391] ? security_socket_sendmsg+0xad/0xc0 [ 115.807650][ T7391] ? netlink_getsockopt+0x8e0/0x8e0 [ 115.812832][ T7391] ____sys_sendmsg+0x56f/0x860 [ 115.818520][ T7391] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 115.823690][ T7391] __sys_sendmsg+0x26a/0x350 [ 115.828250][ T7391] ? ____sys_sendmsg+0x860/0x860 [ 115.833158][ T7391] ? fsnotify+0x13a0/0x1460 [ 115.837649][ T7391] ? __fsnotify_parent+0x300/0x300 [ 115.842756][ T7391] ? security_file_permission+0x128/0x300 [ 115.848445][ T7391] ? __sb_end_write+0xa4/0xf0 [ 115.853116][ T7391] ? vfs_write+0x427/0x4f0 [ 115.857525][ T7391] do_syscall_64+0xcb/0x150 [ 115.862015][ T7391] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.868744][ T7391] RIP: 0033:0x45de89 [ 115.872615][ T7391] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 115.892207][ T7391] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.900592][ T7391] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 115.908543][ T7391] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 115.916503][ T7391] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 115.924444][ T7391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 115.932395][ T7391] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c [ 115.944043][ T7389] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 115.955827][ T7389] EXT4-fs (loop2): group descriptors corrupted! 01:04:35 executing program 3: io_setup(0x83, &(0x7f00000003c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) 01:04:35 executing program 5 (fault-call:4 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 115.975091][ T7398] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 116.025504][ T7405] FAULT_INJECTION: forcing a failure. [ 116.025504][ T7405] name failslab, interval 1, probability 0, space 0, times 0 [ 116.038533][ T7405] CPU: 0 PID: 7405 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 116.048602][ T7405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.058631][ T7405] Call Trace: [ 116.061907][ T7405] dump_stack+0x1b0/0x21e [ 116.066208][ T7405] ? devkmsg_release+0x11c/0x11c [ 116.071140][ T7405] ? show_regs_print_info+0x12/0x12 [ 116.076331][ T7405] should_fail+0x6fb/0x860 [ 116.080721][ T7405] ? setup_fault_attr+0x2b0/0x2b0 [ 116.085728][ T7405] ? fib_sync_up+0x5e9/0x680 [ 116.090291][ T7405] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 116.096615][ T7405] ? __rcu_read_lock+0x50/0x50 [ 116.101438][ T7405] ? __alloc_skb+0x88/0x4d0 [ 116.105920][ T7405] should_failslab+0x5/0x20 [ 116.110394][ T7405] kmem_cache_alloc+0x36/0x250 [ 116.115133][ T7405] __alloc_skb+0x88/0x4d0 [ 116.119450][ T7405] rtmsg_ifinfo_build_skb+0x81/0x180 [ 116.124704][ T7405] rtmsg_ifinfo+0x73/0x120 [ 116.129179][ T7405] netdev_state_change+0x157/0x200 [ 116.134273][ T7405] ? netdev_features_change+0x140/0x140 [ 116.139795][ T7405] ? unwind_get_return_address+0x48/0x90 [ 116.145405][ T7405] ? arch_stack_walk+0x98/0xe0 [ 116.150141][ T7405] ? validate_linkmsg+0x392/0x490 [ 116.155139][ T7405] do_setlink+0x2c8/0x3a90 [ 116.159533][ T7405] ? find_next_and_bit+0x169/0x1b0 [ 116.164626][ T7405] ? cpumask_next_and+0x11/0x30 [ 116.169449][ T7405] ? update_sg_lb_stats+0x670/0xce0 [ 116.174616][ T7405] ? rtnetlink_event+0x1b0/0x1b0 [ 116.179522][ T7405] ? __kasan_kmalloc+0x179/0x1b0 [ 116.184429][ T7405] ? __kasan_kmalloc+0x117/0x1b0 [ 116.189335][ T7405] ? kmem_cache_alloc_trace+0xc3/0x270 [ 116.194761][ T7405] ? rtnl_newlink+0xff/0x1d90 [ 116.199404][ T7405] ? rtnetlink_rcv_msg+0x936/0xc20 [ 116.204746][ T7405] ? netlink_rcv_skb+0x1f0/0x460 [ 116.209668][ T7405] ? netlink_unicast+0x87c/0xa20 [ 116.214576][ T7405] ? netlink_sendmsg+0x9a7/0xd40 [ 116.219511][ T7405] ? ____sys_sendmsg+0x56f/0x860 [ 116.224422][ T7405] ? __sys_sendmsg+0x26a/0x350 [ 116.229171][ T7405] ? do_syscall_64+0xcb/0x150 [ 116.233833][ T7405] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.239873][ T7405] ? unwind_next_frame+0x1c07/0x22b0 [ 116.245133][ T7405] ? __nla_validate_parse+0x18fd/0x2010 [ 116.250697][ T7405] ? __nla_validate+0x50/0x50 [ 116.255350][ T7405] ? setup_fault_attr+0x2b0/0x2b0 [ 116.260356][ T7405] ? memset+0x1f/0x40 [ 116.264326][ T7405] ? unwind_next_frame+0x1c07/0x22b0 [ 116.269582][ T7405] ? rtnl_newlink+0xff/0x1d90 [ 116.274261][ T7405] rtnl_newlink+0x1240/0x1d90 [ 116.278926][ T7405] ? rtnl_setlink+0x560/0x560 [ 116.283587][ T7405] ? memset+0x1f/0x40 [ 116.287540][ T7405] ? unwind_next_frame+0x1c07/0x22b0 [ 116.292809][ T7405] ? memset+0x1f/0x40 [ 116.296763][ T7405] ? unwind_next_frame+0x1c07/0x22b0 [ 116.302039][ T7405] ? arch_stack_walk+0x78/0xe0 [ 116.306788][ T7405] ? __rcu_read_lock+0x50/0x50 [ 116.311521][ T7405] ? __rcu_read_lock+0x50/0x50 [ 116.316306][ T7405] ? memset+0x1f/0x40 [ 116.320268][ T7405] ? unwind_next_frame+0x1c07/0x22b0 [ 116.325536][ T7405] ? cap_capable+0x23f/0x280 [ 116.330094][ T7405] ? cap_capable+0x23f/0x280 [ 116.334654][ T7405] ? mutex_lock+0xa6/0x110 [ 116.339040][ T7405] ? mutex_trylock+0xb0/0xb0 [ 116.343607][ T7405] ? security_capable+0xb1/0xd0 [ 116.348443][ T7405] ? rtnl_setlink+0x560/0x560 [ 116.353109][ T7405] rtnetlink_rcv_msg+0x936/0xc20 [ 116.358034][ T7405] ? is_bpf_text_address+0x290/0x2b0 [ 116.363304][ T7405] ? rtnetlink_bind+0x80/0x80 [ 116.367964][ T7405] ? unwind_get_return_address+0x48/0x90 [ 116.373590][ T7405] ? arch_stack_walk+0x98/0xe0 [ 116.378355][ T7405] ? stack_trace_save+0x111/0x1e0 [ 116.383356][ T7405] ? avc_has_perm+0xbd/0x260 [ 116.387952][ T7405] ? stack_trace_snprint+0x150/0x150 [ 116.393259][ T7405] ? _raw_spin_lock_bh+0xa4/0x180 [ 116.398255][ T7405] ? rhashtable_jhash2+0x1cf/0x2f0 [ 116.403342][ T7405] ? jhash+0x740/0x740 [ 116.407396][ T7405] ? rht_key_hashfn+0x157/0x240 [ 116.412229][ T7405] ? deferred_put_nlk_sk+0x210/0x210 [ 116.417487][ T7405] ? netlink_sendmsg+0x73b/0xd40 [ 116.423091][ T7405] ? jhash+0x740/0x740 [ 116.427183][ T7405] ? netlink_hash+0xd0/0xd0 [ 116.431690][ T7405] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.437988][ T7405] ? _raw_spin_lock_irq+0x180/0x180 [ 116.443167][ T7405] ? __rcu_read_lock+0x50/0x50 [ 116.447903][ T7405] netlink_rcv_skb+0x1f0/0x460 [ 116.453594][ T7405] ? rtnetlink_bind+0x80/0x80 [ 116.458242][ T7405] ? netlink_ack+0xa90/0xa90 [ 116.462805][ T7405] ? __rcu_read_lock+0x50/0x50 [ 116.467542][ T7405] ? selinux_vm_enough_memory+0x160/0x160 [ 116.473411][ T7405] ? setup_fault_attr+0x2b0/0x2b0 [ 116.478409][ T7405] ? netlink_trim+0x10a/0x230 [ 116.483061][ T7405] netlink_unicast+0x87c/0xa20 [ 116.487795][ T7405] ? netlink_detachskb+0x60/0x60 [ 116.492726][ T7405] ? __virt_addr_valid+0x1fd/0x290 [ 116.497826][ T7405] netlink_sendmsg+0x9a7/0xd40 [ 116.502563][ T7405] ? netlink_getsockopt+0x8e0/0x8e0 [ 116.507730][ T7405] ? security_socket_sendmsg+0xad/0xc0 [ 116.513173][ T7405] ? netlink_getsockopt+0x8e0/0x8e0 [ 116.518358][ T7405] ____sys_sendmsg+0x56f/0x860 [ 116.523097][ T7405] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 116.528966][ T7405] __sys_sendmsg+0x26a/0x350 [ 116.533541][ T7405] ? ____sys_sendmsg+0x860/0x860 [ 116.538447][ T7405] ? fsnotify+0x13a0/0x1460 [ 116.542917][ T7405] ? __fsnotify_parent+0x300/0x300 [ 116.548029][ T7405] ? security_file_permission+0x128/0x300 [ 116.553718][ T7405] ? __sb_end_write+0xa4/0xf0 [ 116.558379][ T7405] ? vfs_write+0x427/0x4f0 [ 116.562782][ T7405] do_syscall_64+0xcb/0x150 [ 116.567256][ T7405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.573130][ T7405] RIP: 0033:0x45de89 [ 116.577049][ T7405] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 116.596724][ T7405] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 116.605103][ T7405] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 116.613043][ T7405] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 01:04:35 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) 01:04:35 executing program 5 (fault-call:4 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:35 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x0, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 116.620983][ T7405] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 116.628927][ T7405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 116.636871][ T7405] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:35 executing program 3: io_setup(0x83, &(0x7f00000003c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) 01:04:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 116.684659][ T7413] FAULT_INJECTION: forcing a failure. [ 116.684659][ T7413] name failslab, interval 1, probability 0, space 0, times 0 [ 116.709299][ T7416] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 116.718827][ T7413] CPU: 0 PID: 7413 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 116.728910][ T7413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.738956][ T7413] Call Trace: [ 116.742277][ T7413] dump_stack+0x1b0/0x21e [ 116.746602][ T7413] ? devkmsg_release+0x11c/0x11c [ 116.751531][ T7413] ? show_regs_print_info+0x12/0x12 [ 116.756722][ T7413] should_fail+0x6fb/0x860 [ 116.761135][ T7413] ? setup_fault_attr+0x2b0/0x2b0 [ 116.766152][ T7413] ? fib_sync_up+0x5e9/0x680 [ 116.770720][ T7413] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 116.777027][ T7413] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 116.782475][ T7413] should_failslab+0x5/0x20 [ 116.786956][ T7413] __kmalloc_track_caller+0x5d/0x2b0 [ 116.792218][ T7413] ? kmem_cache_alloc+0x1d5/0x250 [ 116.797222][ T7413] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 116.802657][ T7413] __alloc_skb+0xd1/0x4d0 [ 116.808355][ T7413] rtmsg_ifinfo_build_skb+0x81/0x180 [ 116.813630][ T7413] rtmsg_ifinfo+0x73/0x120 [ 116.818023][ T7413] netdev_state_change+0x157/0x200 [ 116.823111][ T7413] ? netdev_features_change+0x140/0x140 [ 116.828719][ T7413] ? unwind_get_return_address+0x48/0x90 [ 116.834326][ T7413] ? arch_stack_walk+0x98/0xe0 [ 116.839066][ T7413] ? validate_linkmsg+0x392/0x490 [ 116.844079][ T7413] do_setlink+0x2c8/0x3a90 [ 116.848476][ T7413] ? rtnetlink_event+0x1b0/0x1b0 [ 116.853389][ T7413] ? __kasan_kmalloc+0x179/0x1b0 [ 116.858410][ T7413] ? __kasan_kmalloc+0x117/0x1b0 [ 116.863415][ T7413] ? kmem_cache_alloc_trace+0xc3/0x270 [ 116.868861][ T7413] ? rtnl_newlink+0xff/0x1d90 [ 116.873512][ T7413] ? rtnetlink_rcv_msg+0x936/0xc20 [ 116.878598][ T7413] ? netlink_rcv_skb+0x1f0/0x460 [ 116.883527][ T7413] ? netlink_unicast+0x87c/0xa20 [ 116.888440][ T7413] ? netlink_sendmsg+0x9a7/0xd40 [ 116.893356][ T7413] ? ____sys_sendmsg+0x56f/0x860 [ 116.898273][ T7413] ? __sys_sendmsg+0x26a/0x350 [ 116.903032][ T7413] ? do_syscall_64+0xcb/0x150 [ 116.907685][ T7413] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.913727][ T7413] ? unwind_next_frame+0x1c07/0x22b0 [ 116.918991][ T7413] ? __nla_validate_parse+0x18fd/0x2010 [ 116.924514][ T7413] ? __nla_validate+0x50/0x50 [ 116.929187][ T7413] ? setup_fault_attr+0x2b0/0x2b0 [ 116.934190][ T7413] ? memset+0x1f/0x40 [ 116.938148][ T7413] ? unwind_next_frame+0x1c07/0x22b0 [ 116.943423][ T7413] ? rtnl_newlink+0xff/0x1d90 [ 116.948078][ T7413] rtnl_newlink+0x1240/0x1d90 [ 116.952735][ T7413] ? rtnl_setlink+0x560/0x560 [ 116.957388][ T7413] ? memset+0x1f/0x40 [ 116.961363][ T7413] ? unwind_next_frame+0x1c07/0x22b0 [ 116.966636][ T7413] ? memset+0x1f/0x40 [ 116.970596][ T7413] ? unwind_next_frame+0x1c07/0x22b0 [ 116.975946][ T7413] ? arch_stack_walk+0x78/0xe0 [ 116.980687][ T7413] ? __rcu_read_lock+0x50/0x50 [ 116.985428][ T7413] ? __rcu_read_lock+0x50/0x50 [ 116.990180][ T7413] ? memset+0x1f/0x40 [ 116.994147][ T7413] ? unwind_next_frame+0x1c07/0x22b0 [ 116.999456][ T7413] ? cap_capable+0x23f/0x280 [ 117.004206][ T7413] ? cap_capable+0x23f/0x280 [ 117.008787][ T7413] ? mutex_lock+0xa6/0x110 [ 117.013182][ T7413] ? mutex_trylock+0xb0/0xb0 [ 117.017761][ T7413] ? security_capable+0xb1/0xd0 [ 117.022589][ T7413] ? rtnl_setlink+0x560/0x560 [ 117.027237][ T7413] rtnetlink_rcv_msg+0x936/0xc20 [ 117.032153][ T7413] ? is_bpf_text_address+0x290/0x2b0 [ 117.037415][ T7413] ? rtnetlink_bind+0x80/0x80 [ 117.042084][ T7413] ? unwind_get_return_address+0x48/0x90 [ 117.047707][ T7413] ? arch_stack_walk+0x98/0xe0 [ 117.052450][ T7413] ? stack_trace_save+0x111/0x1e0 [ 117.057453][ T7413] ? avc_has_perm+0xbd/0x260 [ 117.062021][ T7413] ? stack_trace_snprint+0x150/0x150 [ 117.067295][ T7413] ? _raw_spin_lock_bh+0xa4/0x180 [ 117.072296][ T7413] ? rhashtable_jhash2+0x1cf/0x2f0 [ 117.077384][ T7413] ? jhash+0x740/0x740 [ 117.081441][ T7413] ? rht_key_hashfn+0x157/0x240 [ 117.086279][ T7413] ? deferred_put_nlk_sk+0x210/0x210 [ 117.091548][ T7413] ? netlink_sendmsg+0x73b/0xd40 [ 117.096472][ T7413] ? jhash+0x740/0x740 [ 117.100533][ T7413] ? netlink_hash+0xd0/0xd0 [ 117.105098][ T7413] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.111138][ T7413] ? _raw_spin_lock_irq+0x180/0x180 [ 117.116399][ T7413] ? __rcu_read_lock+0x50/0x50 [ 117.121150][ T7413] netlink_rcv_skb+0x1f0/0x460 [ 117.125890][ T7413] ? rtnetlink_bind+0x80/0x80 [ 117.130554][ T7413] ? netlink_ack+0xa90/0xa90 [ 117.135133][ T7413] ? __rcu_read_lock+0x50/0x50 [ 117.139874][ T7413] ? selinux_vm_enough_memory+0x160/0x160 [ 117.145570][ T7413] ? setup_fault_attr+0x2b0/0x2b0 [ 117.150581][ T7413] ? netlink_trim+0x10a/0x230 [ 117.155239][ T7413] netlink_unicast+0x87c/0xa20 [ 117.160253][ T7413] ? netlink_detachskb+0x60/0x60 [ 117.165169][ T7413] ? __virt_addr_valid+0x1fd/0x290 [ 117.170270][ T7413] netlink_sendmsg+0x9a7/0xd40 [ 117.175015][ T7413] ? netlink_getsockopt+0x8e0/0x8e0 [ 117.180205][ T7413] ? security_socket_sendmsg+0xad/0xc0 [ 117.185651][ T7413] ? netlink_getsockopt+0x8e0/0x8e0 [ 117.190829][ T7413] ____sys_sendmsg+0x56f/0x860 [ 117.195571][ T7413] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 117.200749][ T7413] __sys_sendmsg+0x26a/0x350 [ 117.205317][ T7413] ? ____sys_sendmsg+0x860/0x860 [ 117.210236][ T7413] ? fsnotify+0x13a0/0x1460 [ 117.214730][ T7413] ? __fsnotify_parent+0x300/0x300 [ 117.219822][ T7413] ? security_file_permission+0x128/0x300 [ 117.225533][ T7413] ? __sb_end_write+0xa4/0xf0 [ 117.230274][ T7413] ? vfs_write+0x427/0x4f0 [ 117.234672][ T7413] do_syscall_64+0xcb/0x150 [ 117.239166][ T7413] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.245041][ T7413] RIP: 0033:0x45de89 [ 117.248923][ T7413] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 117.268505][ T7413] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.276907][ T7413] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 01:04:36 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) [ 117.284855][ T7413] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 117.292801][ T7413] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 117.300748][ T7413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 117.308696][ T7413] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:36 executing program 5 (fault-call:4 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 117.332992][ T7416] EXT4-fs (loop2): group descriptors corrupted! [ 117.350628][ T7420] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 117.378647][ T7430] FAULT_INJECTION: forcing a failure. [ 117.378647][ T7430] name failslab, interval 1, probability 0, space 0, times 0 [ 117.391588][ T7430] CPU: 0 PID: 7430 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 117.401680][ T7430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.411720][ T7430] Call Trace: [ 117.414998][ T7430] dump_stack+0x1b0/0x21e [ 117.419317][ T7430] ? devkmsg_release+0x11c/0x11c [ 117.424224][ T7430] ? __kasan_kmalloc+0x179/0x1b0 [ 117.429742][ T7430] ? show_regs_print_info+0x12/0x12 [ 117.434920][ T7430] ? __kmalloc_track_caller+0x201/0x2b0 [ 117.440478][ T7430] ? __alloc_skb+0xd1/0x4d0 [ 117.444955][ T7430] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 117.450415][ T7430] ? rtnetlink_rcv_msg+0x930/0xc20 [ 117.455502][ T7430] should_fail+0x6fb/0x860 [ 117.459901][ T7430] ? setup_fault_attr+0x2b0/0x2b0 [ 117.464905][ T7430] ? _raw_spin_lock+0x170/0x170 [ 117.469726][ T7430] ? netlink_trim+0x195/0x230 [ 117.474374][ T7430] should_failslab+0x5/0x20 [ 117.478865][ T7430] __kmalloc_track_caller+0x5d/0x2b0 [ 117.484125][ T7430] ? netlink_trim+0x195/0x230 [ 117.488773][ T7430] pskb_expand_head+0x10d/0xfb0 [ 117.493597][ T7430] ? fib_sync_up+0x5e9/0x680 [ 117.498158][ T7430] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 117.504456][ T7430] netlink_trim+0x195/0x230 [ 117.508934][ T7430] netlink_broadcast_filtered+0x6d/0x10c0 [ 117.514730][ T7430] ? rtmsg_ifinfo_build_skb+0xe2/0x180 [ 117.520164][ T7430] ? rtmsg_ifinfo_build_skb+0xfa/0x180 [ 117.525594][ T7430] nlmsg_notify+0xa6/0x150 [ 117.529979][ T7430] netdev_state_change+0x157/0x200 [ 117.535074][ T7430] ? netdev_features_change+0x140/0x140 [ 117.540603][ T7430] ? unwind_get_return_address+0x48/0x90 [ 117.546203][ T7430] ? arch_stack_walk+0x98/0xe0 [ 117.550936][ T7430] ? validate_linkmsg+0x392/0x490 [ 117.555933][ T7430] do_setlink+0x2c8/0x3a90 [ 117.560322][ T7430] ? rtnetlink_event+0x1b0/0x1b0 [ 117.565240][ T7430] ? __kasan_kmalloc+0x179/0x1b0 [ 117.570145][ T7430] ? __kasan_kmalloc+0x117/0x1b0 [ 117.575065][ T7430] ? kmem_cache_alloc_trace+0xc3/0x270 [ 117.580491][ T7430] ? rtnl_newlink+0xff/0x1d90 [ 117.585145][ T7430] ? rtnetlink_rcv_msg+0x936/0xc20 [ 117.590233][ T7430] ? netlink_rcv_skb+0x1f0/0x460 [ 117.595590][ T7430] ? netlink_unicast+0x87c/0xa20 [ 117.600514][ T7430] ? netlink_sendmsg+0x9a7/0xd40 [ 117.605421][ T7430] ? ____sys_sendmsg+0x56f/0x860 [ 117.610325][ T7430] ? __sys_sendmsg+0x26a/0x350 [ 117.615072][ T7430] ? do_syscall_64+0xcb/0x150 [ 117.619717][ T7430] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.625769][ T7430] ? unwind_next_frame+0x1c07/0x22b0 [ 117.631054][ T7430] ? __nla_validate_parse+0x18fd/0x2010 [ 117.636596][ T7430] ? __nla_validate+0x50/0x50 [ 117.641258][ T7430] ? setup_fault_attr+0x2b0/0x2b0 [ 117.646253][ T7430] ? memset+0x1f/0x40 [ 117.650220][ T7430] ? unwind_next_frame+0x1c07/0x22b0 [ 117.655474][ T7430] ? rtnl_newlink+0xff/0x1d90 [ 117.660135][ T7430] rtnl_newlink+0x1240/0x1d90 [ 117.664803][ T7430] ? rtnl_setlink+0x560/0x560 [ 117.669449][ T7430] ? memset+0x1f/0x40 [ 117.673404][ T7430] ? unwind_next_frame+0x1c07/0x22b0 [ 117.678677][ T7430] ? memset+0x1f/0x40 [ 117.682631][ T7430] ? unwind_next_frame+0x1c07/0x22b0 [ 117.687913][ T7430] ? arch_stack_walk+0x78/0xe0 [ 117.692658][ T7430] ? __rcu_read_lock+0x50/0x50 [ 117.697402][ T7430] ? __rcu_read_lock+0x50/0x50 [ 117.702153][ T7430] ? memset+0x1f/0x40 [ 117.706135][ T7430] ? unwind_next_frame+0x1c07/0x22b0 [ 117.711389][ T7430] ? cap_capable+0x23f/0x280 [ 117.715947][ T7430] ? cap_capable+0x23f/0x280 [ 117.720508][ T7430] ? mutex_lock+0xa6/0x110 [ 117.724911][ T7430] ? mutex_trylock+0xb0/0xb0 [ 117.729469][ T7430] ? security_capable+0xb1/0xd0 [ 117.734386][ T7430] ? rtnl_setlink+0x560/0x560 [ 117.739041][ T7430] rtnetlink_rcv_msg+0x936/0xc20 [ 117.743947][ T7430] ? is_bpf_text_address+0x290/0x2b0 [ 117.749214][ T7430] ? rtnetlink_bind+0x80/0x80 [ 117.753858][ T7430] ? unwind_get_return_address+0x48/0x90 [ 117.759460][ T7430] ? arch_stack_walk+0x98/0xe0 [ 117.764192][ T7430] ? stack_trace_save+0x111/0x1e0 [ 117.769185][ T7430] ? avc_has_perm+0xbd/0x260 [ 117.773751][ T7430] ? stack_trace_snprint+0x150/0x150 [ 117.779024][ T7430] ? _raw_spin_lock_bh+0xa4/0x180 [ 117.784029][ T7430] ? rhashtable_jhash2+0x1cf/0x2f0 [ 117.789109][ T7430] ? jhash+0x740/0x740 [ 117.793171][ T7430] ? rht_key_hashfn+0x157/0x240 [ 117.798009][ T7430] ? deferred_put_nlk_sk+0x210/0x210 [ 117.803262][ T7430] ? netlink_sendmsg+0x73b/0xd40 [ 117.808166][ T7430] ? jhash+0x740/0x740 [ 117.812202][ T7430] ? netlink_hash+0xd0/0xd0 [ 117.816672][ T7430] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.822790][ T7430] ? _raw_spin_lock_irq+0x180/0x180 [ 117.828925][ T7430] ? __rcu_read_lock+0x50/0x50 [ 117.833667][ T7430] netlink_rcv_skb+0x1f0/0x460 [ 117.838409][ T7430] ? rtnetlink_bind+0x80/0x80 [ 117.843101][ T7430] ? netlink_ack+0xa90/0xa90 [ 117.847664][ T7430] ? __rcu_read_lock+0x50/0x50 [ 117.852763][ T7430] ? selinux_vm_enough_memory+0x160/0x160 [ 117.858468][ T7430] ? setup_fault_attr+0x2b0/0x2b0 [ 117.863505][ T7430] ? netlink_trim+0x10a/0x230 [ 117.868150][ T7430] netlink_unicast+0x87c/0xa20 [ 117.872885][ T7430] ? netlink_detachskb+0x60/0x60 [ 117.877811][ T7430] ? __virt_addr_valid+0x1fd/0x290 [ 117.882908][ T7430] netlink_sendmsg+0x9a7/0xd40 [ 117.888609][ T7430] ? netlink_getsockopt+0x8e0/0x8e0 [ 117.893777][ T7430] ? security_socket_sendmsg+0xad/0xc0 [ 117.899219][ T7430] ? netlink_getsockopt+0x8e0/0x8e0 [ 117.904388][ T7430] ____sys_sendmsg+0x56f/0x860 [ 117.909139][ T7430] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 117.914308][ T7430] __sys_sendmsg+0x26a/0x350 [ 117.918866][ T7430] ? ____sys_sendmsg+0x860/0x860 [ 117.923783][ T7430] ? fsnotify+0x13a0/0x1460 [ 117.928269][ T7430] ? __fsnotify_parent+0x300/0x300 [ 117.933355][ T7430] ? security_file_permission+0x128/0x300 [ 117.939060][ T7430] ? __sb_end_write+0xa4/0xf0 [ 117.943713][ T7430] ? vfs_write+0x427/0x4f0 [ 117.948128][ T7430] do_syscall_64+0xcb/0x150 [ 117.952605][ T7430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.958491][ T7430] RIP: 0033:0x45de89 [ 117.962358][ T7430] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:04:37 executing program 3: io_setup(0x83, &(0x7f00000003c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) [ 117.981950][ T7430] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.990345][ T7430] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 117.998304][ T7430] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 118.006260][ T7430] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 118.014213][ T7430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 118.022168][ T7430] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:37 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x0, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:37 executing program 5 (fault-call:4 fault-nth:9): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:37 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, 0x0}]) [ 118.053107][ T7429] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 118.073095][ T7429] EXT4-fs (loop2): group descriptors corrupted! [ 118.099326][ T7439] FAULT_INJECTION: forcing a failure. [ 118.099326][ T7439] name failslab, interval 1, probability 0, space 0, times 0 [ 118.112524][ T7439] CPU: 1 PID: 7439 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 118.122576][ T7439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.132609][ T7439] Call Trace: [ 118.135931][ T7439] dump_stack+0x1b0/0x21e [ 118.140243][ T7439] ? devkmsg_release+0x11c/0x11c [ 118.145160][ T7439] ? show_regs_print_info+0x12/0x12 [ 118.150431][ T7439] should_fail+0x6fb/0x860 [ 118.154831][ T7439] ? setup_fault_attr+0x2b0/0x2b0 [ 118.159833][ T7439] ? fib_sync_up+0x5e9/0x680 [ 118.164403][ T7439] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 118.170710][ T7439] ? __rcu_read_lock+0x50/0x50 [ 118.175453][ T7439] ? __alloc_skb+0x88/0x4d0 [ 118.179937][ T7439] should_failslab+0x5/0x20 [ 118.184424][ T7439] kmem_cache_alloc+0x36/0x250 [ 118.189181][ T7439] __alloc_skb+0x88/0x4d0 [ 118.193493][ T7439] rtmsg_ifinfo_build_skb+0x81/0x180 [ 118.198758][ T7439] rtmsg_ifinfo+0x73/0x120 [ 118.203166][ T7439] netdev_state_change+0x157/0x200 [ 118.208283][ T7439] ? netdev_features_change+0x140/0x140 [ 118.213831][ T7439] ? unwind_get_return_address+0x48/0x90 [ 118.219445][ T7439] ? arch_stack_walk+0x98/0xe0 [ 118.224188][ T7439] ? validate_linkmsg+0x392/0x490 [ 118.229203][ T7439] do_setlink+0x2c8/0x3a90 [ 118.233599][ T7439] ? switch_mm+0xe0/0xe0 [ 118.237820][ T7439] ? rtnetlink_event+0x1b0/0x1b0 [ 118.242875][ T7439] ? __kasan_kmalloc+0x179/0x1b0 [ 118.247799][ T7439] ? __kasan_kmalloc+0x117/0x1b0 [ 118.252736][ T7439] ? kmem_cache_alloc_trace+0xc3/0x270 [ 118.258172][ T7439] ? rtnl_newlink+0xff/0x1d90 [ 118.262925][ T7439] ? rtnetlink_rcv_msg+0x936/0xc20 [ 118.268023][ T7439] ? netlink_rcv_skb+0x1f0/0x460 [ 118.274953][ T7439] ? netlink_unicast+0x87c/0xa20 [ 118.279885][ T7439] ? netlink_sendmsg+0x9a7/0xd40 [ 118.284805][ T7439] ? ____sys_sendmsg+0x56f/0x860 [ 118.289733][ T7439] ? __sys_sendmsg+0x26a/0x350 [ 118.294474][ T7439] ? do_syscall_64+0xcb/0x150 [ 118.299127][ T7439] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.305202][ T7439] ? __nla_validate_parse+0x18fd/0x2010 [ 118.310727][ T7439] ? __nla_validate+0x50/0x50 [ 118.315482][ T7439] ? setup_fault_attr+0x2b0/0x2b0 [ 118.320486][ T7439] ? memset+0x1f/0x40 [ 118.324461][ T7439] ? unwind_next_frame+0x1c07/0x22b0 [ 118.329736][ T7439] ? rtnl_newlink+0xff/0x1d90 [ 118.334478][ T7439] rtnl_newlink+0x1240/0x1d90 [ 118.339152][ T7439] ? rtnl_setlink+0x560/0x560 [ 118.343811][ T7439] ? memset+0x1f/0x40 [ 118.347770][ T7439] ? unwind_next_frame+0x1c07/0x22b0 [ 118.353125][ T7439] ? memset+0x1f/0x40 [ 118.357101][ T7439] ? unwind_next_frame+0x1c07/0x22b0 [ 118.362364][ T7439] ? arch_stack_walk+0x78/0xe0 [ 118.367110][ T7439] ? __rcu_read_lock+0x50/0x50 [ 118.371909][ T7439] ? __rcu_read_lock+0x50/0x50 [ 118.376668][ T7439] ? memset+0x1f/0x40 [ 118.380629][ T7439] ? unwind_next_frame+0x1c07/0x22b0 [ 118.385889][ T7439] ? cap_capable+0x23f/0x280 [ 118.390458][ T7439] ? cap_capable+0x23f/0x280 [ 118.395030][ T7439] ? mutex_lock+0xa6/0x110 [ 118.399432][ T7439] ? mutex_trylock+0xb0/0xb0 [ 118.404015][ T7439] ? security_capable+0xb1/0xd0 [ 118.408844][ T7439] ? rtnl_setlink+0x560/0x560 [ 118.413501][ T7439] rtnetlink_rcv_msg+0x936/0xc20 [ 118.418517][ T7439] ? is_bpf_text_address+0x290/0x2b0 [ 118.423781][ T7439] ? rtnetlink_bind+0x80/0x80 [ 118.428433][ T7439] ? unwind_get_return_address+0x48/0x90 [ 118.434053][ T7439] ? arch_stack_walk+0x98/0xe0 [ 118.438797][ T7439] ? stack_trace_save+0x111/0x1e0 [ 118.443868][ T7439] ? avc_has_perm+0xbd/0x260 [ 118.448436][ T7439] ? stack_trace_snprint+0x150/0x150 [ 118.453721][ T7439] ? _raw_spin_lock_bh+0xa4/0x180 [ 118.458724][ T7439] ? rhashtable_jhash2+0x1cf/0x2f0 [ 118.463809][ T7439] ? jhash+0x740/0x740 [ 118.467854][ T7439] ? rht_key_hashfn+0x157/0x240 [ 118.472680][ T7439] ? deferred_put_nlk_sk+0x210/0x210 [ 118.477950][ T7439] ? netlink_sendmsg+0x73b/0xd40 [ 118.482863][ T7439] ? jhash+0x740/0x740 [ 118.486905][ T7439] ? netlink_hash+0xd0/0xd0 [ 118.491383][ T7439] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.497421][ T7439] ? _raw_spin_lock_irq+0x180/0x180 [ 118.502597][ T7439] ? __rcu_read_lock+0x50/0x50 [ 118.507335][ T7439] netlink_rcv_skb+0x1f0/0x460 [ 118.512077][ T7439] ? rtnetlink_bind+0x80/0x80 [ 118.516736][ T7439] ? netlink_ack+0xa90/0xa90 [ 118.521320][ T7439] ? __rcu_read_lock+0x50/0x50 [ 118.526072][ T7439] ? selinux_vm_enough_memory+0x160/0x160 [ 118.531779][ T7439] ? setup_fault_attr+0x2b0/0x2b0 [ 118.536782][ T7439] ? netlink_trim+0x10a/0x230 [ 118.541434][ T7439] netlink_unicast+0x87c/0xa20 [ 118.546175][ T7439] ? netlink_detachskb+0x60/0x60 [ 118.551089][ T7439] ? __virt_addr_valid+0x1fd/0x290 [ 118.556187][ T7439] netlink_sendmsg+0x9a7/0xd40 [ 118.560929][ T7439] ? netlink_getsockopt+0x8e0/0x8e0 [ 118.566103][ T7439] ? security_socket_sendmsg+0xad/0xc0 [ 118.571538][ T7439] ? netlink_getsockopt+0x8e0/0x8e0 [ 118.576723][ T7439] ____sys_sendmsg+0x56f/0x860 [ 118.581463][ T7439] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 118.586640][ T7439] __sys_sendmsg+0x26a/0x350 [ 118.591206][ T7439] ? ____sys_sendmsg+0x860/0x860 [ 118.596131][ T7439] ? fsnotify+0x13a0/0x1460 [ 118.600610][ T7439] ? __fsnotify_parent+0x300/0x300 [ 118.605699][ T7439] ? security_file_permission+0x128/0x300 [ 118.611395][ T7439] ? __sb_end_write+0xa4/0xf0 [ 118.616046][ T7439] ? vfs_write+0x427/0x4f0 [ 118.620464][ T7439] do_syscall_64+0xcb/0x150 [ 118.624964][ T7439] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.630832][ T7439] RIP: 0033:0x45de89 [ 118.634706][ T7439] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:04:37 executing program 5 (fault-call:4 fault-nth:10): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 118.654307][ T7439] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.662695][ T7439] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 118.670640][ T7439] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 118.678585][ T7439] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 118.686550][ T7439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 118.694500][ T7439] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 118.733384][ T7440] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 118.754674][ T7449] FAULT_INJECTION: forcing a failure. [ 118.754674][ T7449] name failslab, interval 1, probability 0, space 0, times 0 [ 118.767305][ T7449] CPU: 0 PID: 7449 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 118.777349][ T7449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.787385][ T7449] Call Trace: [ 118.790659][ T7449] dump_stack+0x1b0/0x21e [ 118.794970][ T7449] ? devkmsg_release+0x11c/0x11c [ 118.799880][ T7449] ? show_regs_print_info+0x12/0x12 [ 118.805062][ T7449] should_fail+0x6fb/0x860 [ 118.809478][ T7449] ? setup_fault_attr+0x2b0/0x2b0 [ 118.814481][ T7449] ? fib_sync_up+0x5e9/0x680 [ 118.819042][ T7449] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 118.825338][ T7449] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 118.830766][ T7449] should_failslab+0x5/0x20 [ 118.835251][ T7449] __kmalloc_track_caller+0x5d/0x2b0 [ 118.840508][ T7449] ? kmem_cache_alloc+0x1d5/0x250 [ 118.845502][ T7449] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 118.850944][ T7449] __alloc_skb+0xd1/0x4d0 [ 118.855260][ T7449] rtmsg_ifinfo_build_skb+0x81/0x180 [ 118.860515][ T7449] rtmsg_ifinfo+0x73/0x120 [ 118.864901][ T7449] netdev_state_change+0x157/0x200 [ 118.869984][ T7449] ? netdev_features_change+0x140/0x140 [ 118.875499][ T7449] ? unwind_get_return_address+0x48/0x90 01:04:37 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x0, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 118.881101][ T7449] ? arch_stack_walk+0x98/0xe0 [ 118.885832][ T7449] ? validate_linkmsg+0x392/0x490 [ 118.890838][ T7449] do_setlink+0x2c8/0x3a90 [ 118.895253][ T7449] ? rtnetlink_event+0x1b0/0x1b0 [ 118.900165][ T7449] ? __kasan_kmalloc+0x179/0x1b0 [ 118.905105][ T7449] ? __kasan_kmalloc+0x117/0x1b0 [ 118.910026][ T7449] ? kmem_cache_alloc_trace+0xc3/0x270 [ 118.915465][ T7449] ? rtnl_newlink+0xff/0x1d90 [ 118.920118][ T7449] ? rtnetlink_rcv_msg+0x936/0xc20 [ 118.925207][ T7449] ? netlink_rcv_skb+0x1f0/0x460 [ 118.930113][ T7449] ? netlink_unicast+0x87c/0xa20 [ 118.935032][ T7449] ? netlink_sendmsg+0x9a7/0xd40 [ 118.939937][ T7449] ? ____sys_sendmsg+0x56f/0x860 [ 118.944841][ T7449] ? __sys_sendmsg+0x26a/0x350 [ 118.949596][ T7449] ? do_syscall_64+0xcb/0x150 [ 118.954249][ T7449] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.960290][ T7449] ? unwind_next_frame+0x1c07/0x22b0 [ 118.965557][ T7449] ? __nla_validate_parse+0x18fd/0x2010 [ 118.971070][ T7449] ? __nla_validate+0x50/0x50 [ 118.975741][ T7449] ? setup_fault_attr+0x2b0/0x2b0 [ 118.980744][ T7449] ? memset+0x1f/0x40 [ 118.984697][ T7449] ? unwind_next_frame+0x1c07/0x22b0 [ 118.989974][ T7449] ? rtnl_newlink+0xff/0x1d90 [ 118.994623][ T7449] rtnl_newlink+0x1240/0x1d90 [ 118.999277][ T7449] ? rtnl_setlink+0x560/0x560 [ 119.003924][ T7449] ? memset+0x1f/0x40 [ 119.007884][ T7449] ? unwind_next_frame+0x1c07/0x22b0 [ 119.013141][ T7449] ? memset+0x1f/0x40 [ 119.017109][ T7449] ? unwind_next_frame+0x1c07/0x22b0 [ 119.022421][ T7449] ? arch_stack_walk+0x78/0xe0 [ 119.027158][ T7449] ? __rcu_read_lock+0x50/0x50 [ 119.031892][ T7449] ? __rcu_read_lock+0x50/0x50 [ 119.036752][ T7449] ? memset+0x1f/0x40 [ 119.040718][ T7449] ? unwind_next_frame+0x1c07/0x22b0 [ 119.046074][ T7449] ? cap_capable+0x23f/0x280 [ 119.050636][ T7449] ? cap_capable+0x23f/0x280 [ 119.055207][ T7449] ? mutex_lock+0xa6/0x110 [ 119.059593][ T7449] ? mutex_trylock+0xb0/0xb0 [ 119.064150][ T7449] ? security_capable+0xb1/0xd0 [ 119.068986][ T7449] ? rtnl_setlink+0x560/0x560 [ 119.073641][ T7449] rtnetlink_rcv_msg+0x936/0xc20 [ 119.078548][ T7449] ? is_bpf_text_address+0x290/0x2b0 [ 119.083889][ T7449] ? rtnetlink_bind+0x80/0x80 [ 119.088534][ T7449] ? unwind_get_return_address+0x48/0x90 [ 119.094135][ T7449] ? arch_stack_walk+0x98/0xe0 [ 119.098881][ T7449] ? stack_trace_save+0x111/0x1e0 [ 119.103876][ T7449] ? avc_has_perm+0xbd/0x260 [ 119.108448][ T7449] ? stack_trace_snprint+0x150/0x150 [ 119.113704][ T7449] ? _raw_spin_lock_bh+0xa4/0x180 [ 119.118722][ T7449] ? rhashtable_jhash2+0x1cf/0x2f0 [ 119.123810][ T7449] ? jhash+0x740/0x740 [ 119.127859][ T7449] ? rht_key_hashfn+0x157/0x240 [ 119.132679][ T7449] ? deferred_put_nlk_sk+0x210/0x210 [ 119.137953][ T7449] ? netlink_sendmsg+0x73b/0xd40 [ 119.143130][ T7449] ? jhash+0x740/0x740 [ 119.147173][ T7449] ? netlink_hash+0xd0/0xd0 [ 119.151675][ T7449] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.157710][ T7449] ? _raw_spin_lock_irq+0x180/0x180 [ 119.163139][ T7449] ? __rcu_read_lock+0x50/0x50 [ 119.167879][ T7449] netlink_rcv_skb+0x1f0/0x460 [ 119.172630][ T7449] ? rtnetlink_bind+0x80/0x80 [ 119.177289][ T7449] ? netlink_ack+0xa90/0xa90 [ 119.181849][ T7449] ? __rcu_read_lock+0x50/0x50 [ 119.186583][ T7449] ? selinux_vm_enough_memory+0x160/0x160 [ 119.192271][ T7449] ? setup_fault_attr+0x2b0/0x2b0 [ 119.197276][ T7449] ? netlink_trim+0x10a/0x230 [ 119.202010][ T7449] netlink_unicast+0x87c/0xa20 [ 119.206755][ T7449] ? netlink_detachskb+0x60/0x60 [ 119.211682][ T7449] ? __virt_addr_valid+0x1fd/0x290 [ 119.216787][ T7449] netlink_sendmsg+0x9a7/0xd40 [ 119.221540][ T7449] ? netlink_getsockopt+0x8e0/0x8e0 [ 119.226730][ T7449] ? security_socket_sendmsg+0xad/0xc0 [ 119.232167][ T7449] ? netlink_getsockopt+0x8e0/0x8e0 [ 119.237336][ T7449] ____sys_sendmsg+0x56f/0x860 [ 119.242073][ T7449] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 119.247241][ T7449] __sys_sendmsg+0x26a/0x350 [ 119.251805][ T7449] ? ____sys_sendmsg+0x860/0x860 [ 119.256734][ T7449] ? fsnotify+0x13a0/0x1460 [ 119.261218][ T7449] ? __fsnotify_parent+0x300/0x300 [ 119.266359][ T7449] ? security_file_permission+0x128/0x300 [ 119.272059][ T7449] ? __sb_end_write+0xa4/0xf0 [ 119.276729][ T7449] ? vfs_write+0x427/0x4f0 [ 119.281117][ T7449] do_syscall_64+0xcb/0x150 [ 119.285607][ T7449] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.291477][ T7449] RIP: 0033:0x45de89 [ 119.295342][ T7449] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.314920][ T7449] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 119.323316][ T7449] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 01:04:38 executing program 3: r0 = creat(0x0, 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:38 executing program 5 (fault-call:4 fault-nth:11): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 119.331271][ T7449] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 119.339220][ T7449] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 119.347200][ T7449] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 119.355166][ T7449] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:38 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, 0x0}]) [ 119.405466][ T7450] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 119.426718][ T7454] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 119.436109][ T7450] EXT4-fs (loop2): group descriptors corrupted! [ 119.449284][ T7463] FAULT_INJECTION: forcing a failure. [ 119.449284][ T7463] name failslab, interval 1, probability 0, space 0, times 0 [ 119.463139][ T7463] CPU: 1 PID: 7463 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 119.473210][ T7463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.483243][ T7463] Call Trace: [ 119.486551][ T7463] dump_stack+0x1b0/0x21e [ 119.490869][ T7463] ? devkmsg_release+0x11c/0x11c [ 119.495791][ T7463] ? __kasan_kmalloc+0x179/0x1b0 [ 119.500730][ T7463] ? show_regs_print_info+0x12/0x12 [ 119.505930][ T7463] ? __kmalloc_track_caller+0x201/0x2b0 [ 119.511460][ T7463] ? __alloc_skb+0xd1/0x4d0 [ 119.515933][ T7463] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 119.521376][ T7463] ? rtnetlink_rcv_msg+0x930/0xc20 [ 119.526468][ T7463] should_fail+0x6fb/0x860 [ 119.530878][ T7463] ? setup_fault_attr+0x2b0/0x2b0 [ 119.535960][ T7463] ? _raw_spin_lock+0x170/0x170 [ 119.540782][ T7463] ? netlink_trim+0x195/0x230 [ 119.545450][ T7463] should_failslab+0x5/0x20 [ 119.549936][ T7463] __kmalloc_track_caller+0x5d/0x2b0 [ 119.555201][ T7463] ? _raw_spin_trylock_bh+0x120/0x190 [ 119.560639][ T7463] ? netlink_trim+0x195/0x230 [ 119.565299][ T7463] pskb_expand_head+0x10d/0xfb0 [ 119.570133][ T7463] ? _raw_spin_unlock+0x5/0x20 [ 119.574867][ T7463] netlink_trim+0x195/0x230 [ 119.579377][ T7463] netlink_broadcast_filtered+0x6d/0x10c0 [ 119.585353][ T7463] ? rtmsg_ifinfo_build_skb+0xe2/0x180 [ 119.590800][ T7463] ? rtmsg_ifinfo_build_skb+0xfa/0x180 [ 119.596244][ T7463] nlmsg_notify+0xa6/0x150 [ 119.600643][ T7463] netdev_state_change+0x157/0x200 [ 119.605733][ T7463] ? netdev_features_change+0x140/0x140 [ 119.611247][ T7463] ? unwind_get_return_address+0x48/0x90 [ 119.616848][ T7463] ? arch_stack_walk+0x98/0xe0 [ 119.621589][ T7463] ? validate_linkmsg+0x392/0x490 [ 119.626612][ T7463] do_setlink+0x2c8/0x3a90 [ 119.631003][ T7463] ? rtnetlink_event+0x1b0/0x1b0 [ 119.635920][ T7463] ? __kasan_kmalloc+0x179/0x1b0 [ 119.640828][ T7463] ? __kasan_kmalloc+0x117/0x1b0 [ 119.645750][ T7463] ? kmem_cache_alloc_trace+0xc3/0x270 [ 119.651191][ T7463] ? rtnl_newlink+0xff/0x1d90 [ 119.655850][ T7463] ? rtnetlink_rcv_msg+0x936/0xc20 [ 119.660934][ T7463] ? netlink_rcv_skb+0x1f0/0x460 [ 119.665853][ T7463] ? netlink_unicast+0x87c/0xa20 [ 119.670758][ T7463] ? netlink_sendmsg+0x9a7/0xd40 [ 119.675677][ T7463] ? ____sys_sendmsg+0x56f/0x860 [ 119.682503][ T7463] ? __sys_sendmsg+0x26a/0x350 [ 119.687249][ T7463] ? do_syscall_64+0xcb/0x150 [ 119.691924][ T7463] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.697960][ T7463] ? unwind_next_frame+0x1c07/0x22b0 [ 119.703228][ T7463] ? __nla_validate_parse+0x18fd/0x2010 [ 119.708751][ T7463] ? __nla_validate+0x50/0x50 [ 119.713399][ T7463] ? _raw_spin_unlock+0x5/0x20 [ 119.718147][ T7463] ? ___slab_alloc+0x297/0x450 [ 119.722892][ T7463] ? rtnl_newlink+0xff/0x1d90 [ 119.727551][ T7463] rtnl_newlink+0x1240/0x1d90 [ 119.732214][ T7463] ? rtnl_setlink+0x560/0x560 [ 119.736881][ T7463] ? memset+0x1f/0x40 [ 119.740846][ T7463] ? unwind_next_frame+0x1c07/0x22b0 [ 119.746116][ T7463] ? memset+0x1f/0x40 [ 119.750091][ T7463] ? unwind_next_frame+0x1c07/0x22b0 [ 119.755372][ T7463] ? arch_stack_walk+0x78/0xe0 [ 119.760154][ T7463] ? __rcu_read_lock+0x50/0x50 [ 119.764893][ T7463] ? __rcu_read_lock+0x50/0x50 [ 119.769647][ T7463] ? memset+0x1f/0x40 [ 119.773600][ T7463] ? unwind_next_frame+0x1c07/0x22b0 [ 119.778856][ T7463] ? cap_capable+0x23f/0x280 [ 119.783483][ T7463] ? cap_capable+0x23f/0x280 [ 119.788043][ T7463] ? mutex_lock+0xa6/0x110 [ 119.792428][ T7463] ? mutex_trylock+0xb0/0xb0 [ 119.796987][ T7463] ? security_capable+0xb1/0xd0 [ 119.801818][ T7463] ? rtnl_setlink+0x560/0x560 [ 119.806475][ T7463] rtnetlink_rcv_msg+0x936/0xc20 [ 119.811385][ T7463] ? is_bpf_text_address+0x290/0x2b0 [ 119.816653][ T7463] ? rtnetlink_bind+0x80/0x80 [ 119.823295][ T7463] ? unwind_get_return_address+0x48/0x90 [ 119.828895][ T7463] ? arch_stack_walk+0x98/0xe0 [ 119.833646][ T7463] ? stack_trace_save+0x111/0x1e0 [ 119.838656][ T7463] ? avc_has_perm+0xbd/0x260 [ 119.843222][ T7463] ? stack_trace_snprint+0x150/0x150 [ 119.848489][ T7463] ? _raw_spin_lock_bh+0xa4/0x180 [ 119.853484][ T7463] ? rhashtable_jhash2+0x1cf/0x2f0 [ 119.858566][ T7463] ? jhash+0x740/0x740 [ 119.862613][ T7463] ? rht_key_hashfn+0x157/0x240 [ 119.867449][ T7463] ? deferred_put_nlk_sk+0x210/0x210 [ 119.872700][ T7463] ? netlink_sendmsg+0x73b/0xd40 [ 119.877605][ T7463] ? jhash+0x740/0x740 [ 119.881662][ T7463] ? netlink_hash+0xd0/0xd0 [ 119.886153][ T7463] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.892209][ T7463] ? _raw_spin_lock_irq+0x180/0x180 [ 119.897391][ T7463] ? __rcu_read_lock+0x50/0x50 [ 119.902131][ T7463] netlink_rcv_skb+0x1f0/0x460 [ 119.906888][ T7463] ? rtnetlink_bind+0x80/0x80 [ 119.911580][ T7463] ? netlink_ack+0xa90/0xa90 [ 119.916147][ T7463] ? __rcu_read_lock+0x50/0x50 [ 119.920932][ T7463] ? selinux_vm_enough_memory+0x160/0x160 [ 119.926634][ T7463] ? setup_fault_attr+0x2b0/0x2b0 [ 119.931643][ T7463] ? netlink_trim+0x10a/0x230 [ 119.936378][ T7463] netlink_unicast+0x87c/0xa20 [ 119.941126][ T7463] ? netlink_detachskb+0x60/0x60 [ 119.946045][ T7463] ? __virt_addr_valid+0x1fd/0x290 [ 119.951131][ T7463] netlink_sendmsg+0x9a7/0xd40 [ 119.955886][ T7463] ? netlink_getsockopt+0x8e0/0x8e0 [ 119.961057][ T7463] ? security_socket_sendmsg+0xad/0xc0 [ 119.966485][ T7463] ? netlink_getsockopt+0x8e0/0x8e0 [ 119.971653][ T7463] ____sys_sendmsg+0x56f/0x860 [ 119.976386][ T7463] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 119.981554][ T7463] __sys_sendmsg+0x26a/0x350 [ 119.986152][ T7463] ? ____sys_sendmsg+0x860/0x860 [ 119.991071][ T7463] ? fsnotify+0x13a0/0x1460 [ 119.995559][ T7463] ? __fsnotify_parent+0x300/0x300 [ 120.000644][ T7463] ? security_file_permission+0x128/0x300 [ 120.006335][ T7463] ? __sb_end_write+0xa4/0xf0 [ 120.011002][ T7463] ? vfs_write+0x427/0x4f0 [ 120.015408][ T7463] do_syscall_64+0xcb/0x150 [ 120.019895][ T7463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.025767][ T7463] RIP: 0033:0x45de89 [ 120.029630][ T7463] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.049649][ T7463] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:04:39 executing program 5 (fault-call:4 fault-nth:12): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:39 executing program 3: r0 = creat(0x0, 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:39 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, 0x0}]) [ 120.058044][ T7463] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 120.066004][ T7463] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 120.073958][ T7463] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 120.081901][ T7463] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 120.089844][ T7463] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 120.225371][ T7471] FAULT_INJECTION: forcing a failure. [ 120.225371][ T7471] name failslab, interval 1, probability 0, space 0, times 0 [ 120.241156][ T7471] CPU: 1 PID: 7471 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 120.251353][ T7471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.261381][ T7471] Call Trace: [ 120.264647][ T7471] dump_stack+0x1b0/0x21e [ 120.268962][ T7471] ? devkmsg_release+0x11c/0x11c [ 120.273870][ T7471] ? show_regs_print_info+0x12/0x12 [ 120.279044][ T7471] should_fail+0x6fb/0x860 [ 120.283445][ T7471] ? setup_fault_attr+0x2b0/0x2b0 [ 120.288438][ T7471] ? fib_sync_up+0x5e9/0x680 [ 120.292998][ T7471] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 120.299325][ T7471] ? __rcu_read_lock+0x50/0x50 [ 120.304074][ T7471] ? __alloc_skb+0x88/0x4d0 [ 120.308558][ T7471] should_failslab+0x5/0x20 [ 120.313062][ T7471] kmem_cache_alloc+0x36/0x250 [ 120.317804][ T7471] __alloc_skb+0x88/0x4d0 [ 120.322105][ T7471] rtmsg_ifinfo_build_skb+0x81/0x180 [ 120.327368][ T7471] rtmsg_ifinfo+0x73/0x120 [ 120.331755][ T7471] netdev_state_change+0x157/0x200 [ 120.336846][ T7471] ? netdev_features_change+0x140/0x140 [ 120.342362][ T7471] ? unwind_get_return_address+0x48/0x90 [ 120.347963][ T7471] ? arch_stack_walk+0x98/0xe0 [ 120.352710][ T7471] ? validate_linkmsg+0x392/0x490 [ 120.357704][ T7471] do_setlink+0x2c8/0x3a90 [ 120.362102][ T7471] ? rtnetlink_event+0x1b0/0x1b0 [ 120.367019][ T7471] ? __kasan_kmalloc+0x179/0x1b0 [ 120.371952][ T7471] ? __kasan_kmalloc+0x117/0x1b0 [ 120.376895][ T7471] ? kmem_cache_alloc_trace+0xc3/0x270 [ 120.382380][ T7471] ? rtnl_newlink+0xff/0x1d90 [ 120.387042][ T7471] ? rtnetlink_rcv_msg+0x936/0xc20 [ 120.392126][ T7471] ? netlink_rcv_skb+0x1f0/0x460 [ 120.397038][ T7471] ? netlink_unicast+0x87c/0xa20 [ 120.401949][ T7471] ? netlink_sendmsg+0x9a7/0xd40 [ 120.406863][ T7471] ? ____sys_sendmsg+0x56f/0x860 [ 120.411771][ T7471] ? __sys_sendmsg+0x26a/0x350 [ 120.416540][ T7471] ? do_syscall_64+0xcb/0x150 [ 120.421190][ T7471] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.427245][ T7471] ? unwind_next_frame+0x1c07/0x22b0 [ 120.432513][ T7471] ? __nla_validate_parse+0x18fd/0x2010 [ 120.438083][ T7471] ? __nla_validate+0x50/0x50 [ 120.442734][ T7471] ? setup_fault_attr+0x2b0/0x2b0 [ 120.447746][ T7471] ? ___slab_alloc+0x9b/0x450 [ 120.452393][ T7471] ? memset+0x1f/0x40 [ 120.456346][ T7471] ? unwind_next_frame+0x1c07/0x22b0 [ 120.461709][ T7471] ? rtnl_newlink+0xff/0x1d90 [ 120.466373][ T7471] rtnl_newlink+0x1240/0x1d90 [ 120.471038][ T7471] ? rtnl_setlink+0x560/0x560 [ 120.475688][ T7471] ? memset+0x1f/0x40 [ 120.479657][ T7471] ? unwind_next_frame+0x1c07/0x22b0 [ 120.484939][ T7471] ? memset+0x1f/0x40 [ 120.488896][ T7471] ? unwind_next_frame+0x1c07/0x22b0 [ 120.494163][ T7471] ? arch_stack_walk+0x78/0xe0 [ 120.498948][ T7471] ? __rcu_read_lock+0x50/0x50 [ 120.503705][ T7471] ? __rcu_read_lock+0x50/0x50 [ 120.508448][ T7471] ? memset+0x1f/0x40 [ 120.512485][ T7471] ? unwind_next_frame+0x1c07/0x22b0 [ 120.517792][ T7471] ? cap_capable+0x23f/0x280 [ 120.522368][ T7471] ? cap_capable+0x23f/0x280 [ 120.526943][ T7471] ? mutex_lock+0xa6/0x110 [ 120.531417][ T7471] ? mutex_trylock+0xb0/0xb0 [ 120.535998][ T7471] ? security_capable+0xb1/0xd0 [ 120.540869][ T7471] ? rtnl_setlink+0x560/0x560 [ 120.545525][ T7471] rtnetlink_rcv_msg+0x936/0xc20 [ 120.550443][ T7471] ? is_bpf_text_address+0x290/0x2b0 [ 120.555710][ T7471] ? rtnetlink_bind+0x80/0x80 [ 120.560356][ T7471] ? unwind_get_return_address+0x48/0x90 [ 120.565974][ T7471] ? arch_stack_walk+0x98/0xe0 [ 120.570736][ T7471] ? stack_trace_save+0x111/0x1e0 [ 120.575733][ T7471] ? avc_has_perm+0xbd/0x260 [ 120.580293][ T7471] ? stack_trace_snprint+0x150/0x150 [ 120.585545][ T7471] ? _raw_spin_lock_bh+0xa4/0x180 [ 120.590539][ T7471] ? rhashtable_jhash2+0x1cf/0x2f0 [ 120.595633][ T7471] ? jhash+0x740/0x740 [ 120.599674][ T7471] ? rht_key_hashfn+0x157/0x240 [ 120.605039][ T7471] ? deferred_put_nlk_sk+0x210/0x210 [ 120.610307][ T7471] ? netlink_sendmsg+0x73b/0xd40 [ 120.615263][ T7471] ? jhash+0x740/0x740 [ 120.619335][ T7471] ? netlink_hash+0xd0/0xd0 [ 120.623807][ T7471] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.629838][ T7471] ? _raw_spin_lock_irq+0x180/0x180 [ 120.635007][ T7471] ? __rcu_read_lock+0x50/0x50 [ 120.639753][ T7471] netlink_rcv_skb+0x1f0/0x460 [ 120.644487][ T7471] ? rtnetlink_bind+0x80/0x80 [ 120.649136][ T7471] ? netlink_ack+0xa90/0xa90 [ 120.653712][ T7471] ? __rcu_read_lock+0x50/0x50 [ 120.658444][ T7471] ? selinux_vm_enough_memory+0x160/0x160 [ 120.664138][ T7471] ? setup_fault_attr+0x2b0/0x2b0 [ 120.669145][ T7471] ? netlink_trim+0x10a/0x230 [ 120.673796][ T7471] netlink_unicast+0x87c/0xa20 [ 120.678537][ T7471] ? netlink_detachskb+0x60/0x60 [ 120.683442][ T7471] ? __virt_addr_valid+0x1fd/0x290 [ 120.688520][ T7471] netlink_sendmsg+0x9a7/0xd40 [ 120.693258][ T7471] ? netlink_getsockopt+0x8e0/0x8e0 [ 120.698425][ T7471] ? security_socket_sendmsg+0xad/0xc0 [ 120.703855][ T7471] ? netlink_getsockopt+0x8e0/0x8e0 [ 120.709022][ T7471] ____sys_sendmsg+0x56f/0x860 [ 120.713755][ T7471] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 120.718921][ T7471] __sys_sendmsg+0x26a/0x350 [ 120.723492][ T7471] ? ____sys_sendmsg+0x860/0x860 [ 120.728395][ T7471] ? fsnotify+0x13a0/0x1460 [ 120.732871][ T7471] ? __fsnotify_parent+0x300/0x300 [ 120.737979][ T7471] ? security_file_permission+0x128/0x300 [ 120.743671][ T7471] ? __sb_end_write+0xa4/0xf0 [ 120.748336][ T7471] ? vfs_write+0x427/0x4f0 [ 120.752752][ T7471] do_syscall_64+0xcb/0x150 [ 120.757247][ T7471] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.763109][ T7471] RIP: 0033:0x45de89 [ 120.766976][ T7471] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.786567][ T7471] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 120.794946][ T7471] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 120.802898][ T7471] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 120.810924][ T7471] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 120.818890][ T7471] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c 01:04:39 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x0, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:39 executing program 3: r0 = creat(0x0, 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 120.826831][ T7471] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c [ 120.863191][ T7474] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) 01:04:39 executing program 5 (fault-call:4 fault-nth:13): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 120.873420][ T7475] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 120.889476][ T7474] EXT4-fs (loop2): group descriptors corrupted! 01:04:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:40 executing program 0 (fault-call:11 fault-nth:0): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 120.954909][ T7489] FAULT_INJECTION: forcing a failure. [ 120.954909][ T7489] name failslab, interval 1, probability 0, space 0, times 0 [ 120.967619][ T7489] CPU: 0 PID: 7489 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 120.977665][ T7489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.987726][ T7489] Call Trace: [ 120.991002][ T7489] dump_stack+0x1b0/0x21e [ 120.995315][ T7489] ? devkmsg_release+0x11c/0x11c [ 121.000240][ T7489] ? show_regs_print_info+0x12/0x12 [ 121.005457][ T7489] should_fail+0x6fb/0x860 [ 121.009868][ T7489] ? setup_fault_attr+0x2b0/0x2b0 [ 121.014875][ T7489] ? fib_sync_up+0x5e9/0x680 [ 121.019438][ T7489] ? netdev_master_upper_dev_get_rcu+0x14d/0x180 [ 121.025739][ T7489] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 121.031182][ T7489] should_failslab+0x5/0x20 [ 121.035667][ T7489] __kmalloc_track_caller+0x5d/0x2b0 [ 121.040929][ T7489] ? kmem_cache_alloc+0x1d5/0x250 [ 121.045929][ T7489] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 121.051381][ T7489] __alloc_skb+0xd1/0x4d0 [ 121.055703][ T7489] rtmsg_ifinfo_build_skb+0x81/0x180 [ 121.060981][ T7489] rtmsg_ifinfo+0x73/0x120 [ 121.065375][ T7489] netdev_state_change+0x157/0x200 [ 121.070480][ T7489] ? netdev_features_change+0x140/0x140 [ 121.076011][ T7489] ? unwind_get_return_address+0x48/0x90 [ 121.081629][ T7489] ? arch_stack_walk+0x98/0xe0 [ 121.086363][ T7489] ? validate_linkmsg+0x392/0x490 [ 121.091365][ T7489] do_setlink+0x2c8/0x3a90 [ 121.095759][ T7489] ? __schedule+0x8ae/0xe30 [ 121.100241][ T7489] ? rtnetlink_event+0x1b0/0x1b0 [ 121.105163][ T7489] ? __kasan_kmalloc+0x179/0x1b0 [ 121.110080][ T7489] ? __kasan_kmalloc+0x117/0x1b0 [ 121.114991][ T7489] ? kmem_cache_alloc_trace+0xc3/0x270 [ 121.120419][ T7489] ? rtnl_newlink+0xff/0x1d90 [ 121.125065][ T7489] ? rtnetlink_rcv_msg+0x936/0xc20 [ 121.130147][ T7489] ? netlink_rcv_skb+0x1f0/0x460 [ 121.135070][ T7489] ? netlink_unicast+0x87c/0xa20 [ 121.139991][ T7489] ? netlink_sendmsg+0x9a7/0xd40 [ 121.144915][ T7489] ? ____sys_sendmsg+0x56f/0x860 [ 121.149821][ T7489] ? __sys_sendmsg+0x26a/0x350 [ 121.154556][ T7489] ? do_syscall_64+0xcb/0x150 [ 121.159379][ T7489] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 121.165469][ T7489] ? unwind_next_frame+0x1c07/0x22b0 [ 121.170726][ T7489] ? __nla_validate_parse+0x18fd/0x2010 [ 121.176239][ T7489] ? __nla_validate+0x50/0x50 [ 121.180995][ T7489] ? setup_fault_attr+0x2b0/0x2b0 [ 121.186012][ T7489] ? memset+0x1f/0x40 [ 121.189981][ T7489] ? unwind_next_frame+0x1c07/0x22b0 [ 121.195258][ T7489] ? rtnl_newlink+0xff/0x1d90 [ 121.199905][ T7489] rtnl_newlink+0x1240/0x1d90 [ 121.204594][ T7489] ? rtnl_setlink+0x560/0x560 [ 121.209245][ T7489] ? memset+0x1f/0x40 [ 121.213200][ T7489] ? unwind_next_frame+0x1c07/0x22b0 [ 121.218453][ T7489] ? memset+0x1f/0x40 [ 121.222403][ T7489] ? unwind_next_frame+0x1c07/0x22b0 [ 121.227673][ T7489] ? arch_stack_walk+0x78/0xe0 [ 121.232409][ T7489] ? __rcu_read_lock+0x50/0x50 [ 121.237161][ T7489] ? __rcu_read_lock+0x50/0x50 [ 121.241904][ T7489] ? memset+0x1f/0x40 [ 121.245944][ T7489] ? unwind_next_frame+0x1c07/0x22b0 [ 121.251218][ T7489] ? cap_capable+0x23f/0x280 [ 121.255786][ T7489] ? cap_capable+0x23f/0x280 [ 121.260385][ T7489] ? mutex_lock+0xa6/0x110 [ 121.264813][ T7489] ? mutex_trylock+0xb0/0xb0 [ 121.269374][ T7489] ? security_capable+0xb1/0xd0 [ 121.274212][ T7489] ? rtnl_setlink+0x560/0x560 [ 121.278874][ T7489] rtnetlink_rcv_msg+0x936/0xc20 [ 121.283786][ T7489] ? is_bpf_text_address+0x290/0x2b0 [ 121.289060][ T7489] ? rtnetlink_bind+0x80/0x80 [ 121.293732][ T7489] ? unwind_get_return_address+0x48/0x90 [ 121.299358][ T7489] ? arch_stack_walk+0x98/0xe0 [ 121.304118][ T7489] ? stack_trace_save+0x111/0x1e0 [ 121.309111][ T7489] ? avc_has_perm+0xbd/0x260 [ 121.313681][ T7489] ? stack_trace_snprint+0x150/0x150 [ 121.318933][ T7489] ? _raw_spin_lock_bh+0xa4/0x180 [ 121.323926][ T7489] ? rhashtable_jhash2+0x1cf/0x2f0 [ 121.329006][ T7489] ? jhash+0x740/0x740 [ 121.333047][ T7489] ? rht_key_hashfn+0x157/0x240 [ 121.337881][ T7489] ? deferred_put_nlk_sk+0x210/0x210 [ 121.343133][ T7489] ? netlink_sendmsg+0x73b/0xd40 [ 121.348037][ T7489] ? jhash+0x740/0x740 [ 121.352072][ T7489] ? netlink_hash+0xd0/0xd0 [ 121.356545][ T7489] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 121.362584][ T7489] ? _raw_spin_lock_irq+0x180/0x180 [ 121.367933][ T7489] ? __rcu_read_lock+0x50/0x50 [ 121.372724][ T7489] netlink_rcv_skb+0x1f0/0x460 [ 121.377469][ T7489] ? rtnetlink_bind+0x80/0x80 [ 121.382117][ T7489] ? netlink_ack+0xa90/0xa90 [ 121.386701][ T7489] ? __rcu_read_lock+0x50/0x50 [ 121.391457][ T7489] ? selinux_vm_enough_memory+0x160/0x160 [ 121.397198][ T7489] ? setup_fault_attr+0x2b0/0x2b0 [ 121.402243][ T7489] ? netlink_trim+0x10a/0x230 [ 121.407001][ T7489] netlink_unicast+0x87c/0xa20 [ 121.411779][ T7489] ? netlink_detachskb+0x60/0x60 [ 121.416797][ T7489] ? __virt_addr_valid+0x1fd/0x290 [ 121.421879][ T7489] netlink_sendmsg+0x9a7/0xd40 [ 121.426637][ T7489] ? netlink_getsockopt+0x8e0/0x8e0 [ 121.431829][ T7489] ? security_socket_sendmsg+0xad/0xc0 [ 121.437295][ T7489] ? netlink_getsockopt+0x8e0/0x8e0 [ 121.442487][ T7489] ____sys_sendmsg+0x56f/0x860 [ 121.447223][ T7489] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 121.452403][ T7489] __sys_sendmsg+0x26a/0x350 [ 121.456962][ T7489] ? ____sys_sendmsg+0x860/0x860 [ 121.461867][ T7489] ? fsnotify+0x13a0/0x1460 [ 121.466340][ T7489] ? __fsnotify_parent+0x300/0x300 [ 121.471433][ T7489] ? security_file_permission+0x128/0x300 [ 121.477151][ T7489] ? __sb_end_write+0xa4/0xf0 [ 121.481807][ T7489] ? vfs_write+0x427/0x4f0 [ 121.486212][ T7489] do_syscall_64+0xcb/0x150 [ 121.490688][ T7489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 121.496545][ T7489] RIP: 0033:0x45de89 [ 121.503115][ T7489] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 121.522703][ T7489] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 121.531081][ T7489] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 121.539028][ T7489] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 121.546981][ T7489] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 01:04:40 executing program 5 (fault-call:4 fault-nth:14): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:40 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 121.555802][ T7489] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 121.563741][ T7489] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:40 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 121.615172][ T7494] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 121.633995][ T7499] FAULT_INJECTION: forcing a failure. [ 121.633995][ T7499] name failslab, interval 1, probability 0, space 0, times 0 [ 121.635667][ T7498] FAULT_INJECTION: forcing a failure. [ 121.635667][ T7498] name failslab, interval 1, probability 0, space 0, times 0 [ 121.646846][ T7499] CPU: 0 PID: 7499 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 121.669253][ T7499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.679294][ T7499] Call Trace: [ 121.682572][ T7499] dump_stack+0x1b0/0x21e [ 121.686884][ T7499] ? devkmsg_release+0x11c/0x11c [ 121.691802][ T7499] ? show_regs_print_info+0x12/0x12 [ 121.696982][ T7499] ? handle_mm_fault+0x138a/0x4140 [ 121.702078][ T7499] should_fail+0x6fb/0x860 [ 121.706476][ T7499] ? setup_fault_attr+0x2b0/0x2b0 [ 121.711479][ T7499] ? kstrtouint_from_user+0x1cb/0x230 [ 121.716836][ T7499] ? io_submit_one+0x158/0x2370 [ 121.721665][ T7499] should_failslab+0x5/0x20 [ 121.726320][ T7499] kmem_cache_alloc+0x36/0x250 [ 121.731065][ T7499] io_submit_one+0x158/0x2370 [ 121.735724][ T7499] ? do_user_addr_fault+0x55c/0x9f0 [ 121.740900][ T7499] ? lookup_ioctx+0x460/0x460 [ 121.745558][ T7499] ? page_fault+0x2f/0x40 [ 121.749871][ T7499] ? __rcu_read_lock+0x50/0x50 [ 121.754618][ T7499] ? __se_sys_io_submit+0x90/0x380 [ 121.759707][ T7499] ? lookup_ioctx+0x26e/0x460 [ 121.764378][ T7499] ? security_file_permission+0x128/0x300 [ 121.770075][ T7499] __se_sys_io_submit+0x169/0x380 [ 121.775081][ T7499] ? fput_many+0x42/0x1a0 [ 121.779395][ T7499] ? __x64_sys_io_submit+0x80/0x80 [ 121.786394][ T7499] ? ksys_write+0x237/0x2a0 [ 121.790899][ T7499] ? __ia32_sys_read+0x80/0x80 [ 121.795641][ T7499] ? fput_many+0x42/0x1a0 [ 121.799953][ T7499] do_syscall_64+0xcb/0x150 [ 121.804698][ T7499] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 121.810675][ T7499] RIP: 0033:0x45de89 [ 121.814568][ T7499] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 121.834149][ T7499] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 121.842538][ T7499] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 121.850506][ T7499] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 121.858470][ T7499] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 121.867208][ T7499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 121.875162][ T7499] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 121.883122][ T7498] CPU: 1 PID: 7498 Comm: syz-executor.5 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 121.893182][ T7498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.903282][ T7498] Call Trace: [ 121.906546][ T7498] dump_stack+0x1b0/0x21e [ 121.910893][ T7498] ? devkmsg_release+0x11c/0x11c [ 121.915799][ T7498] ? show_regs_print_info+0x12/0x12 [ 121.921574][ T7498] ? __kmalloc_track_caller+0x201/0x2b0 [ 121.927178][ T7498] ? __alloc_skb+0xd1/0x4d0 [ 121.931659][ T7498] ? rtmsg_ifinfo_build_skb+0x81/0x180 [ 121.937102][ T7498] ? rtnetlink_rcv_msg+0x930/0xc20 [ 121.942187][ T7498] should_fail+0x6fb/0x860 [ 121.946576][ T7498] ? setup_fault_attr+0x2b0/0x2b0 [ 121.951586][ T7498] ? _raw_spin_lock+0x170/0x170 [ 121.956406][ T7498] ? netlink_trim+0x195/0x230 [ 121.961084][ T7498] should_failslab+0x5/0x20 [ 121.965558][ T7498] __kmalloc_track_caller+0x5d/0x2b0 [ 121.970817][ T7498] ? _raw_spin_trylock_bh+0x120/0x190 [ 121.976245][ T7498] ? netlink_trim+0x195/0x230 [ 121.980890][ T7498] pskb_expand_head+0x10d/0xfb0 [ 121.985710][ T7498] ? ___slab_alloc+0x297/0x450 [ 121.990457][ T7498] netlink_trim+0x195/0x230 [ 121.994945][ T7498] netlink_broadcast_filtered+0x6d/0x10c0 [ 122.000646][ T7498] ? rtmsg_ifinfo_build_skb+0xe2/0x180 [ 122.006089][ T7498] ? rtmsg_ifinfo_build_skb+0xfa/0x180 [ 122.011533][ T7498] nlmsg_notify+0xa6/0x150 [ 122.015922][ T7498] netdev_state_change+0x157/0x200 [ 122.021011][ T7498] ? netdev_features_change+0x140/0x140 [ 122.026535][ T7498] ? unwind_get_return_address+0x48/0x90 [ 122.032142][ T7498] ? arch_stack_walk+0x98/0xe0 [ 122.036881][ T7498] ? validate_linkmsg+0x392/0x490 [ 122.041898][ T7498] do_setlink+0x2c8/0x3a90 [ 122.046283][ T7498] ? rtnetlink_event+0x1b0/0x1b0 [ 122.051204][ T7498] ? __kasan_kmalloc+0x179/0x1b0 [ 122.056109][ T7498] ? __kasan_kmalloc+0x117/0x1b0 [ 122.061015][ T7498] ? kmem_cache_alloc_trace+0xc3/0x270 [ 122.066455][ T7498] ? rtnl_newlink+0xff/0x1d90 [ 122.071115][ T7498] ? rtnetlink_rcv_msg+0x936/0xc20 [ 122.076194][ T7498] ? netlink_rcv_skb+0x1f0/0x460 [ 122.081100][ T7498] ? netlink_unicast+0x87c/0xa20 [ 122.086015][ T7498] ? netlink_sendmsg+0x9a7/0xd40 [ 122.090940][ T7498] ? ____sys_sendmsg+0x56f/0x860 [ 122.095878][ T7498] ? __sys_sendmsg+0x26a/0x350 [ 122.100698][ T7498] ? do_syscall_64+0xcb/0x150 [ 122.105366][ T7498] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.111401][ T7498] ? unwind_next_frame+0x1c07/0x22b0 [ 122.116666][ T7498] ? __nla_validate_parse+0x18fd/0x2010 [ 122.122614][ T7498] ? __nla_validate+0x50/0x50 [ 122.127275][ T7498] ? setup_fault_attr+0x2b0/0x2b0 [ 122.132268][ T7498] ? memset+0x1f/0x40 [ 122.136232][ T7498] ? unwind_next_frame+0x1c07/0x22b0 [ 122.142279][ T7498] ? rtnl_newlink+0xff/0x1d90 [ 122.146938][ T7498] rtnl_newlink+0x1240/0x1d90 [ 122.151587][ T7498] ? rtnl_setlink+0x560/0x560 [ 122.156248][ T7498] ? memset+0x1f/0x40 [ 122.160212][ T7498] ? unwind_next_frame+0x1c07/0x22b0 [ 122.165513][ T7498] ? memset+0x1f/0x40 [ 122.169478][ T7498] ? unwind_next_frame+0x1c07/0x22b0 [ 122.174753][ T7498] ? arch_stack_walk+0x78/0xe0 [ 122.179487][ T7498] ? __rcu_read_lock+0x50/0x50 [ 122.184243][ T7498] ? __rcu_read_lock+0x50/0x50 [ 122.189007][ T7498] ? memset+0x1f/0x40 [ 122.192957][ T7498] ? unwind_next_frame+0x1c07/0x22b0 [ 122.198209][ T7498] ? cap_capable+0x23f/0x280 [ 122.202767][ T7498] ? cap_capable+0x23f/0x280 [ 122.207327][ T7498] ? mutex_lock+0xa6/0x110 [ 122.211727][ T7498] ? mutex_trylock+0xb0/0xb0 [ 122.216285][ T7498] ? security_capable+0xb1/0xd0 [ 122.221156][ T7498] ? rtnl_setlink+0x560/0x560 [ 122.225803][ T7498] rtnetlink_rcv_msg+0x936/0xc20 [ 122.230766][ T7498] ? is_bpf_text_address+0x290/0x2b0 [ 122.236022][ T7498] ? rtnetlink_bind+0x80/0x80 [ 122.240667][ T7498] ? unwind_get_return_address+0x48/0x90 [ 122.246272][ T7498] ? arch_stack_walk+0x98/0xe0 [ 122.251126][ T7498] ? stack_trace_save+0x111/0x1e0 [ 122.256124][ T7498] ? avc_has_perm+0xbd/0x260 [ 122.260683][ T7498] ? stack_trace_snprint+0x150/0x150 [ 122.265938][ T7498] ? _raw_spin_lock_bh+0xa4/0x180 [ 122.270946][ T7498] ? rhashtable_jhash2+0x1cf/0x2f0 [ 122.276026][ T7498] ? jhash+0x740/0x740 [ 122.280076][ T7498] ? rht_key_hashfn+0x157/0x240 [ 122.284896][ T7498] ? deferred_put_nlk_sk+0x210/0x210 [ 122.290150][ T7498] ? netlink_sendmsg+0x73b/0xd40 [ 122.295062][ T7498] ? jhash+0x740/0x740 [ 122.299111][ T7498] ? netlink_hash+0xd0/0xd0 [ 122.303591][ T7498] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.309636][ T7498] ? _raw_spin_lock_irq+0x180/0x180 [ 122.314815][ T7498] ? __rcu_read_lock+0x50/0x50 [ 122.319549][ T7498] netlink_rcv_skb+0x1f0/0x460 [ 122.324283][ T7498] ? rtnetlink_bind+0x80/0x80 [ 122.328962][ T7498] ? netlink_ack+0xa90/0xa90 [ 122.333553][ T7498] ? __rcu_read_lock+0x50/0x50 [ 122.338285][ T7498] ? selinux_vm_enough_memory+0x160/0x160 [ 122.344240][ T7498] ? setup_fault_attr+0x2b0/0x2b0 [ 122.349248][ T7498] ? netlink_trim+0x10a/0x230 [ 122.353933][ T7498] netlink_unicast+0x87c/0xa20 [ 122.358842][ T7498] ? netlink_detachskb+0x60/0x60 [ 122.363747][ T7498] ? __virt_addr_valid+0x1fd/0x290 [ 122.368841][ T7498] netlink_sendmsg+0x9a7/0xd40 [ 122.373573][ T7498] ? netlink_getsockopt+0x8e0/0x8e0 [ 122.378783][ T7498] ? security_socket_sendmsg+0xad/0xc0 [ 122.384228][ T7498] ? netlink_getsockopt+0x8e0/0x8e0 [ 122.389431][ T7498] ____sys_sendmsg+0x56f/0x860 [ 122.394174][ T7498] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 122.399344][ T7498] __sys_sendmsg+0x26a/0x350 [ 122.403904][ T7498] ? ____sys_sendmsg+0x860/0x860 [ 122.408826][ T7498] ? fsnotify+0x13a0/0x1460 [ 122.413302][ T7498] ? __fsnotify_parent+0x300/0x300 [ 122.418560][ T7498] ? security_file_permission+0x128/0x300 [ 122.424258][ T7498] ? __sb_end_write+0xa4/0xf0 [ 122.428914][ T7498] ? vfs_write+0x427/0x4f0 [ 122.433344][ T7498] do_syscall_64+0xcb/0x150 [ 122.437819][ T7498] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.443692][ T7498] RIP: 0033:0x45de89 [ 122.447562][ T7498] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:04:41 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x0, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 122.467153][ T7498] RSP: 002b:00007ff1743f4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 122.475533][ T7498] RAX: ffffffffffffffda RBX: 000000000002e5c0 RCX: 000000000045de89 [ 122.483489][ T7498] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 122.491429][ T7498] RBP: 00007ff1743f4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 122.499370][ T7498] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 122.509915][ T7498] R13: 00007fffedbded3f R14: 00007ff1743f59c0 R15: 000000000118bf2c 01:04:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:41 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:41 executing program 0 (fault-call:11 fault-nth:1): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 122.572596][ T7513] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 122.589293][ T7513] EXT4-fs (loop2): group descriptors corrupted! [ 122.600697][ T7514] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 122.616361][ T7521] FAULT_INJECTION: forcing a failure. 01:04:41 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 122.616361][ T7521] name failslab, interval 1, probability 0, space 0, times 0 [ 122.630849][ T7521] CPU: 1 PID: 7521 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 122.640923][ T7521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.650960][ T7521] Call Trace: [ 122.654238][ T7521] dump_stack+0x1b0/0x21e [ 122.658547][ T7521] ? devkmsg_release+0x11c/0x11c [ 122.663920][ T7521] ? xas_find_marked+0x8ec/0xa10 [ 122.668839][ T7521] ? show_regs_print_info+0x12/0x12 [ 122.674029][ T7521] ? xas_set_mark+0x18e/0x1e0 [ 122.678707][ T7521] should_fail+0x6fb/0x860 [ 122.683109][ T7521] ? setup_fault_attr+0x2b0/0x2b0 [ 122.688125][ T7521] ? page_writeback_cpu_online+0x2f0/0x2f0 [ 122.693919][ T7521] ? ext4_init_io_end+0x25/0xf0 [ 122.698764][ T7521] should_failslab+0x5/0x20 [ 122.703266][ T7521] kmem_cache_alloc+0x36/0x250 [ 122.708036][ T7521] ext4_init_io_end+0x25/0xf0 [ 122.712693][ T7521] ext4_writepages+0x140d/0x3d10 [ 122.717622][ T7521] ? write_boundary_block+0x150/0x150 [ 122.722979][ T7521] ? ext4_readpage+0x2b0/0x2b0 [ 122.727735][ T7521] ? ext4_get_inode_loc+0x60/0x60 [ 122.732736][ T7521] ? is_bpf_text_address+0x290/0x2b0 [ 122.738015][ T7521] ? stack_trace_save+0x1e0/0x1e0 [ 122.743038][ T7521] ? __brelse+0x54/0x90 [ 122.747180][ T7521] ? ext4_xattr_ibody_get+0x415/0xba0 [ 122.752529][ T7521] ? __up_read+0x6f/0x1b0 [ 122.756835][ T7521] ? ext4_attr_store+0x740/0x740 [ 122.761752][ T7521] ? ext4_readpage+0x2b0/0x2b0 [ 122.766493][ T7521] do_writepages+0x12e/0x290 [ 122.771065][ T7521] ? __writepage+0xc0/0xc0 [ 122.775472][ T7521] ? ext4_xattr_get+0x5a9/0x810 [ 122.780307][ T7521] filemap_write_and_wait_range+0x3b8/0x470 [ 122.786180][ T7521] ? filemap_write_and_wait+0x430/0x430 [ 122.791703][ T7521] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 122.797416][ T7521] generic_file_direct_write+0x18b/0x6c0 [ 122.803030][ T7521] ? pagecache_write_end+0xa0/0xa0 [ 122.808119][ T7521] ? file_update_time+0x2cf/0x3d0 [ 122.813122][ T7521] ? file_remove_privs+0x600/0x600 [ 122.818975][ T7521] ? ext4_issue_zeroout+0x160/0x160 [ 122.824155][ T7521] __generic_file_write_iter+0x27a/0x460 [ 122.830481][ T7521] ext4_file_write_iter+0x9d0/0x1250 [ 122.835752][ T7521] ? ext4_file_read_iter+0x140/0x140 [ 122.841021][ T7521] ? avc_policy_seqno+0x17/0x70 [ 122.845866][ T7521] ? selinux_file_permission+0x2d0/0x520 [ 122.851479][ T7521] ? security_file_permission+0x128/0x300 [ 122.857200][ T7521] aio_write+0x45d/0x5f0 [ 122.861425][ T7521] ? aio_read+0x4a0/0x4a0 [ 122.865751][ T7521] ? __fget+0x37c/0x3c0 [ 122.869902][ T7521] ? setup_fault_attr+0x2b0/0x2b0 [ 122.874905][ T7521] ? fget_many+0x20/0x20 [ 122.879564][ T7521] ? io_submit_one+0x158/0x2370 [ 122.885350][ T7521] ? kmem_cache_alloc+0x1d5/0x250 [ 122.890365][ T7521] io_submit_one+0xa21/0x2370 [ 122.895046][ T7521] ? lookup_ioctx+0x460/0x460 [ 122.899702][ T7521] ? page_fault+0x2f/0x40 [ 122.904014][ T7521] ? __rcu_read_lock+0x50/0x50 [ 122.908755][ T7521] ? __se_sys_io_submit+0x90/0x380 [ 122.913856][ T7521] ? lookup_ioctx+0x26e/0x460 [ 122.918515][ T7521] ? security_file_permission+0x128/0x300 [ 122.924244][ T7521] __se_sys_io_submit+0x169/0x380 [ 122.929251][ T7521] ? fput_many+0x42/0x1a0 [ 122.933564][ T7521] ? __x64_sys_io_submit+0x80/0x80 [ 122.938657][ T7521] ? ksys_write+0x237/0x2a0 [ 122.943142][ T7521] ? __ia32_sys_read+0x80/0x80 [ 122.947903][ T7521] ? fput_many+0x42/0x1a0 [ 122.952237][ T7521] do_syscall_64+0xcb/0x150 [ 122.957248][ T7521] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.963743][ T7521] RIP: 0033:0x45de89 [ 122.967627][ T7521] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 122.987245][ T7521] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 122.995641][ T7521] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 123.005432][ T7521] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 123.014342][ T7521] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 123.022307][ T7521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.030271][ T7521] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:42 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 123.117049][ T7530] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 123.126452][ T7530] EXT4-fs (loop2): group descriptors corrupted! [ 123.135690][ T7533] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:04:42 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x0, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:42 executing program 0 (fault-call:11 fault-nth:2): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:42 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 123.417381][ T7546] FAULT_INJECTION: forcing a failure. [ 123.417381][ T7546] name failslab, interval 1, probability 0, space 0, times 0 [ 123.434451][ T7545] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 123.435800][ T7546] CPU: 0 PID: 7546 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 123.451001][ T7546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.461058][ T7546] Call Trace: [ 123.464347][ T7546] dump_stack+0x1b0/0x21e [ 123.468656][ T7546] ? devkmsg_release+0x11c/0x11c [ 123.473600][ T7546] ? show_regs_print_info+0x12/0x12 [ 123.478795][ T7546] ? mpage_release_unused_pages+0x52c/0x5e0 [ 123.484690][ T7546] should_fail+0x6fb/0x860 [ 123.489085][ T7546] ? setup_fault_attr+0x2b0/0x2b0 [ 123.494103][ T7546] ? slab_free_freelist_hook+0xd0/0x150 [ 123.499639][ T7546] ? ext4_init_io_end+0x25/0xf0 [ 123.505449][ T7546] should_failslab+0x5/0x20 [ 123.510892][ T7546] kmem_cache_alloc+0x36/0x250 [ 123.515635][ T7546] ext4_init_io_end+0x25/0xf0 [ 123.520292][ T7546] ext4_writepages+0x157d/0x3d10 [ 123.525225][ T7546] ? write_boundary_block+0x150/0x150 [ 123.530612][ T7546] ? ext4_readpage+0x2b0/0x2b0 [ 123.535362][ T7546] ? ext4_get_inode_loc+0x60/0x60 [ 123.540364][ T7546] ? is_bpf_text_address+0x290/0x2b0 [ 123.545715][ T7546] ? __brelse+0x54/0x90 [ 123.549845][ T7546] ? ext4_xattr_ibody_get+0x415/0xba0 [ 123.555212][ T7546] ? __up_read+0x6f/0x1b0 [ 123.559519][ T7546] ? ext4_attr_store+0x740/0x740 [ 123.564435][ T7546] ? ext4_readpage+0x2b0/0x2b0 [ 123.569180][ T7546] do_writepages+0x12e/0x290 [ 123.573751][ T7546] ? __writepage+0xc0/0xc0 [ 123.578162][ T7546] ? ext4_xattr_get+0x5a9/0x810 [ 123.582997][ T7546] filemap_write_and_wait_range+0x3b8/0x470 [ 123.588874][ T7546] ? filemap_write_and_wait+0x430/0x430 [ 123.594418][ T7546] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 123.600132][ T7546] generic_file_direct_write+0x18b/0x6c0 [ 123.605760][ T7546] ? pagecache_write_end+0xa0/0xa0 [ 123.610854][ T7546] ? file_update_time+0x2cf/0x3d0 [ 123.615855][ T7546] ? file_remove_privs+0x600/0x600 [ 123.620959][ T7546] ? ext4_issue_zeroout+0x160/0x160 [ 123.626138][ T7546] __generic_file_write_iter+0x27a/0x460 [ 123.631751][ T7546] ext4_file_write_iter+0x9d0/0x1250 [ 123.637019][ T7546] ? ext4_file_read_iter+0x140/0x140 [ 123.642286][ T7546] ? avc_policy_seqno+0x17/0x70 [ 123.647129][ T7546] ? selinux_file_permission+0x2d0/0x520 [ 123.652744][ T7546] ? security_file_permission+0x128/0x300 [ 123.658445][ T7546] aio_write+0x45d/0x5f0 [ 123.662665][ T7546] ? aio_read+0x4a0/0x4a0 [ 123.666970][ T7546] ? __fget+0x37c/0x3c0 [ 123.671126][ T7546] ? setup_fault_attr+0x2b0/0x2b0 [ 123.676128][ T7546] ? fget_many+0x20/0x20 [ 123.680345][ T7546] ? io_submit_one+0x158/0x2370 [ 123.685175][ T7546] ? kmem_cache_alloc+0x1d5/0x250 [ 123.690187][ T7546] io_submit_one+0xa21/0x2370 [ 123.694844][ T7546] ? lookup_ioctx+0x460/0x460 [ 123.699512][ T7546] ? page_fault+0x2f/0x40 [ 123.703837][ T7546] ? __rcu_read_lock+0x50/0x50 [ 123.708588][ T7546] ? __se_sys_io_submit+0x90/0x380 [ 123.713692][ T7546] ? lookup_ioctx+0x26e/0x460 [ 123.718365][ T7546] ? security_file_permission+0x128/0x300 [ 123.724085][ T7546] __se_sys_io_submit+0x169/0x380 [ 123.729086][ T7546] ? fput_many+0x42/0x1a0 [ 123.733410][ T7546] ? __x64_sys_io_submit+0x80/0x80 [ 123.738512][ T7546] ? ksys_write+0x237/0x2a0 [ 123.742995][ T7546] ? __ia32_sys_read+0x80/0x80 [ 123.748522][ T7546] ? fput_many+0x42/0x1a0 [ 123.752833][ T7546] do_syscall_64+0xcb/0x150 [ 123.757407][ T7546] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.763295][ T7546] RIP: 0033:0x45de89 [ 123.767171][ T7546] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 123.786753][ T7546] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 123.795928][ T7546] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 123.804834][ T7546] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 01:04:42 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 123.812782][ T7546] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 123.820731][ T7546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.828681][ T7546] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 123.854308][ T7552] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:04:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x4, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 123.864250][ T7552] EXT4-fs (loop2): group descriptors corrupted! 01:04:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 123.968418][ T7573] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 123.983185][ T7573] EXT4-fs (loop2): group descriptors corrupted! [ 123.992092][ T7569] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:04:43 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:43 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x8, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:43 executing program 0 (fault-call:11 fault-nth:3): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x60, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 124.315706][ T7588] EXT4-fs (loop1): invalid first ino: 0 [ 124.319310][ T7591] FAULT_INJECTION: forcing a failure. [ 124.319310][ T7591] name failslab, interval 1, probability 0, space 0, times 0 [ 124.336142][ T7591] CPU: 0 PID: 7591 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 124.346205][ T7591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.356252][ T7591] Call Trace: [ 124.359519][ T7591] dump_stack+0x1b0/0x21e [ 124.363840][ T7591] ? devkmsg_release+0x11c/0x11c [ 124.368755][ T7591] ? show_regs_print_info+0x12/0x12 [ 124.373928][ T7591] ? arch_stack_walk+0x78/0xe0 [ 124.378674][ T7591] should_fail+0x6fb/0x860 [ 124.383107][ T7591] ? setup_fault_attr+0x2b0/0x2b0 [ 124.388107][ T7591] ? unwind_next_frame+0x1c07/0x22b0 [ 124.393406][ T7591] ? kcalloc+0x2b/0x50 [ 124.397488][ T7591] should_failslab+0x5/0x20 [ 124.401963][ T7591] __kmalloc+0x5f/0x2c0 [ 124.406117][ T7591] ? __rcu_read_lock+0x50/0x50 [ 124.410852][ T7591] kcalloc+0x2b/0x50 [ 124.414732][ T7591] ext4_find_extent+0x2bb/0xce0 [ 124.419573][ T7591] ext4_ext_map_blocks+0x344/0x4650 [ 124.426569][ T7591] ? unwind_get_return_address+0x48/0x90 [ 124.432206][ T7591] ? ext4_ext_release+0x10/0x10 [ 124.437034][ T7591] ? find_get_pages_range_tag+0xa12/0xae0 [ 124.442740][ T7591] ? release_pages+0x9b4/0x9f0 [ 124.447475][ T7591] ? lru_add_drain_cpu+0x3af/0x4e0 [ 124.452574][ T7591] ? __kasan_kmalloc+0x179/0x1b0 [ 124.457483][ T7591] ? down_write+0xd8/0x150 [ 124.461888][ T7591] ? down_read_killable+0x220/0x220 [ 124.467056][ T7591] ? ext4_es_lookup_extent+0x415/0x900 [ 124.473178][ T7591] ext4_map_blocks+0x955/0x1e30 [ 124.478023][ T7591] ? ext4_issue_zeroout+0x160/0x160 [ 124.483199][ T7591] ? write_end_fn+0x150/0x150 [ 124.487848][ T7591] ? setup_fault_attr+0x2b0/0x2b0 [ 124.492856][ T7591] ? slab_free_freelist_hook+0xd0/0x150 [ 124.498374][ T7591] mpage_map_one_extent+0x2d4/0x960 [ 124.504521][ T7591] ? __ext4_journal_start_sb+0x3ad/0x420 [ 124.510120][ T7591] ext4_writepages+0x1d57/0x3d10 [ 124.515031][ T7591] ? ext4_readpage+0x2b0/0x2b0 [ 124.519764][ T7591] ? ext4_get_inode_loc+0x60/0x60 [ 124.524759][ T7591] ? is_bpf_text_address+0x290/0x2b0 [ 124.530016][ T7591] ? __brelse+0x55/0x90 [ 124.534143][ T7591] ? ext4_xattr_ibody_get+0x415/0xba0 [ 124.539486][ T7591] ? __up_read+0x6f/0x1b0 [ 124.543801][ T7591] ? ext4_attr_store+0x740/0x740 [ 124.548725][ T7591] ? ext4_readpage+0x2b0/0x2b0 [ 124.553457][ T7591] do_writepages+0x12e/0x290 [ 124.558022][ T7591] ? __writepage+0xc0/0xc0 [ 124.562426][ T7591] ? ext4_xattr_get+0x5a9/0x810 [ 124.567269][ T7591] filemap_write_and_wait_range+0x3b8/0x470 [ 124.573261][ T7591] ? filemap_write_and_wait+0x430/0x430 [ 124.578786][ T7591] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 124.584485][ T7591] generic_file_direct_write+0x18b/0x6c0 [ 124.590266][ T7591] ? pagecache_write_end+0xa0/0xa0 [ 124.595355][ T7591] ? file_update_time+0x2cf/0x3d0 [ 124.600351][ T7591] ? file_remove_privs+0x600/0x600 [ 124.605473][ T7591] ? ext4_issue_zeroout+0x160/0x160 [ 124.610667][ T7591] __generic_file_write_iter+0x27a/0x460 [ 124.616297][ T7591] ext4_file_write_iter+0x9d0/0x1250 [ 124.621560][ T7591] ? ext4_file_read_iter+0x140/0x140 [ 124.626821][ T7591] ? avc_policy_seqno+0x17/0x70 [ 124.631659][ T7591] ? selinux_file_permission+0x2d0/0x520 [ 124.637270][ T7591] ? security_file_permission+0x128/0x300 [ 124.642962][ T7591] aio_write+0x45d/0x5f0 [ 124.647189][ T7591] ? aio_read+0x4a0/0x4a0 [ 124.651512][ T7591] ? __fget+0x37c/0x3c0 [ 124.655640][ T7591] ? setup_fault_attr+0x2b0/0x2b0 [ 124.660645][ T7591] ? fget_many+0x20/0x20 [ 124.664888][ T7591] ? io_submit_one+0x158/0x2370 [ 124.669719][ T7591] ? kmem_cache_alloc+0x1d5/0x250 [ 124.674742][ T7591] io_submit_one+0xa21/0x2370 [ 124.679436][ T7591] ? lookup_ioctx+0x460/0x460 [ 124.684105][ T7591] ? page_fault+0x2f/0x40 [ 124.688405][ T7591] ? __rcu_read_lock+0x50/0x50 [ 124.693152][ T7591] ? __se_sys_io_submit+0x90/0x380 [ 124.698245][ T7591] ? lookup_ioctx+0x26e/0x460 [ 124.702906][ T7591] ? security_file_permission+0x128/0x300 [ 124.708608][ T7591] __se_sys_io_submit+0x169/0x380 [ 124.713703][ T7591] ? fput_many+0x42/0x1a0 [ 124.718019][ T7591] ? __x64_sys_io_submit+0x80/0x80 [ 124.723120][ T7591] ? ksys_write+0x237/0x2a0 [ 124.727597][ T7591] ? __ia32_sys_read+0x80/0x80 [ 124.732343][ T7591] ? fput_many+0x42/0x1a0 [ 124.736641][ T7591] do_syscall_64+0xcb/0x150 [ 124.741114][ T7591] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.746982][ T7591] RIP: 0033:0x45de89 [ 124.750862][ T7591] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 124.770456][ T7591] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 124.778837][ T7591] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 124.786792][ T7591] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 124.794783][ T7591] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 124.802740][ T7591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 124.810689][ T7591] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:43 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x8e, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 124.867174][ T7592] EXT4-fs (loop2): unsupported descriptor size 0 01:04:44 executing program 0 (fault-call:11 fault-nth:4): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 124.944374][ T7616] FAULT_INJECTION: forcing a failure. [ 124.944374][ T7616] name failslab, interval 1, probability 0, space 0, times 0 [ 124.959342][ T7613] EXT4-fs (loop1): invalid first ino: 0 [ 124.965037][ T7616] CPU: 0 PID: 7616 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 124.975092][ T7616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.985145][ T7616] Call Trace: [ 124.988434][ T7616] dump_stack+0x1b0/0x21e [ 124.992762][ T7616] ? devkmsg_release+0x11c/0x11c [ 124.997678][ T7616] ? __kasan_kmalloc+0x179/0x1b0 [ 125.002594][ T7616] ? show_regs_print_info+0x12/0x12 [ 125.007766][ T7616] ? __kmalloc+0xf7/0x2c0 [ 125.012161][ T7616] ? kcalloc+0x2b/0x50 [ 125.016215][ T7616] ? ext4_find_extent+0x2bb/0xce0 [ 125.021221][ T7616] ? ext4_map_blocks+0x955/0x1e30 [ 125.026224][ T7616] ? mpage_map_one_extent+0x2d4/0x960 [ 125.031586][ T7616] ? ext4_writepages+0x1d57/0x3d10 [ 125.036674][ T7616] ? do_writepages+0x12e/0x290 [ 125.041422][ T7616] should_fail+0x6fb/0x860 [ 125.045830][ T7616] ? setup_fault_attr+0x2b0/0x2b0 [ 125.050844][ T7616] ? arch_stack_walk+0x78/0xe0 [ 125.055590][ T7616] ? ext4_mb_new_blocks+0x423/0x28a0 [ 125.060855][ T7616] should_failslab+0x5/0x20 [ 125.065360][ T7616] kmem_cache_alloc+0x36/0x250 [ 125.070119][ T7616] ? unwind_get_return_address_ptr+0x130/0x130 [ 125.076254][ T7616] ? memset+0x1f/0x40 [ 125.080219][ T7616] ext4_mb_new_blocks+0x423/0x28a0 [ 125.085311][ T7616] ? unwind_next_frame+0x1c07/0x22b0 [ 125.090606][ T7616] ? __kmalloc+0xf7/0x2c0 [ 125.094914][ T7616] ? kcalloc+0x2b/0x50 [ 125.098965][ T7616] ? __rcu_read_lock+0x50/0x50 [ 125.103713][ T7616] ? ext4_mb_pa_callback+0xc0/0xc0 [ 125.108800][ T7616] ? ext4_find_extent+0xa52/0xce0 [ 125.113820][ T7616] ? ext4_inode_to_goal_block+0x263/0x370 [ 125.119518][ T7616] ext4_ext_map_blocks+0x2d6d/0x4650 [ 125.124787][ T7616] ? ext4_ext_release+0x10/0x10 [ 125.129618][ T7616] ? find_get_pages_range_tag+0xa12/0xae0 [ 125.135318][ T7616] ? release_pages+0x9b4/0x9f0 [ 125.140066][ T7616] ? lru_add_drain_cpu+0x3af/0x4e0 [ 125.145242][ T7616] ? __kasan_kmalloc+0x179/0x1b0 [ 125.150162][ T7616] ? ext4_es_lookup_extent+0x415/0x900 [ 125.155607][ T7616] ext4_map_blocks+0x955/0x1e30 [ 125.160453][ T7616] ? ext4_issue_zeroout+0x160/0x160 [ 125.165636][ T7616] ? write_end_fn+0x150/0x150 [ 125.170296][ T7616] ? setup_fault_attr+0x2b0/0x2b0 [ 125.175309][ T7616] ? ___slab_alloc+0x9b/0x450 [ 125.179985][ T7616] ? slab_free_freelist_hook+0xd0/0x150 [ 125.185533][ T7616] mpage_map_one_extent+0x2d4/0x960 [ 125.190715][ T7616] ? __ext4_journal_start_sb+0x3ad/0x420 [ 125.196324][ T7616] ext4_writepages+0x1d57/0x3d10 [ 125.201262][ T7616] ? ext4_readpage+0x2b0/0x2b0 [ 125.206118][ T7616] ? ext4_get_inode_loc+0x60/0x60 [ 125.211124][ T7616] ? is_bpf_text_address+0x290/0x2b0 [ 125.216405][ T7616] ? __brelse+0x55/0x90 [ 125.220916][ T7616] ? ext4_xattr_ibody_get+0x415/0xba0 [ 125.226276][ T7616] ? __up_read+0x6f/0x1b0 [ 125.230674][ T7616] ? ext4_attr_store+0x740/0x740 [ 125.235594][ T7616] ? ext4_readpage+0x2b0/0x2b0 [ 125.240357][ T7616] do_writepages+0x12e/0x290 [ 125.244946][ T7616] ? __writepage+0xc0/0xc0 [ 125.249359][ T7616] ? ext4_xattr_get+0x5a9/0x810 [ 125.255237][ T7616] filemap_write_and_wait_range+0x3b8/0x470 [ 125.261111][ T7616] ? filemap_write_and_wait+0x430/0x430 [ 125.266648][ T7616] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 125.272357][ T7616] generic_file_direct_write+0x18b/0x6c0 [ 125.277982][ T7616] ? pagecache_write_end+0xa0/0xa0 [ 125.283073][ T7616] ? file_update_time+0x2cf/0x3d0 [ 125.288077][ T7616] ? file_remove_privs+0x600/0x600 [ 125.293172][ T7616] ? ext4_issue_zeroout+0x160/0x160 [ 125.298353][ T7616] __generic_file_write_iter+0x27a/0x460 [ 125.303978][ T7616] ext4_file_write_iter+0x9d0/0x1250 [ 125.309258][ T7616] ? ext4_file_read_iter+0x140/0x140 [ 125.314527][ T7616] ? avc_policy_seqno+0x17/0x70 [ 125.319372][ T7616] ? selinux_file_permission+0x2d0/0x520 [ 125.324990][ T7616] ? security_file_permission+0x128/0x300 [ 125.330711][ T7616] aio_write+0x45d/0x5f0 [ 125.335810][ T7616] ? aio_read+0x4a0/0x4a0 [ 125.341751][ T7616] ? __fget+0x37c/0x3c0 [ 125.345888][ T7616] ? setup_fault_attr+0x2b0/0x2b0 [ 125.350890][ T7616] ? fget_many+0x20/0x20 [ 125.355108][ T7616] ? io_submit_one+0x158/0x2370 [ 125.359934][ T7616] ? kmem_cache_alloc+0x1d5/0x250 [ 125.364932][ T7616] io_submit_one+0xa21/0x2370 [ 125.369594][ T7616] ? lookup_ioctx+0x460/0x460 [ 125.374271][ T7616] ? page_fault+0x2f/0x40 [ 125.378612][ T7616] ? __rcu_read_lock+0x50/0x50 [ 125.383365][ T7616] ? __se_sys_io_submit+0x90/0x380 [ 125.388457][ T7616] ? lookup_ioctx+0x26e/0x460 [ 125.393116][ T7616] ? security_file_permission+0x128/0x300 [ 125.398833][ T7616] __se_sys_io_submit+0x169/0x380 [ 125.403838][ T7616] ? fput_many+0x42/0x1a0 [ 125.408143][ T7616] ? __x64_sys_io_submit+0x80/0x80 [ 125.413228][ T7616] ? ksys_write+0x237/0x2a0 [ 125.417794][ T7616] ? __ia32_sys_read+0x80/0x80 [ 125.422547][ T7616] ? fput_many+0x42/0x1a0 [ 125.426870][ T7616] do_syscall_64+0xcb/0x150 [ 125.431368][ T7616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 125.437329][ T7616] RIP: 0033:0x45de89 [ 125.441206][ T7616] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 125.460792][ T7616] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 125.469191][ T7616] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 125.477157][ T7616] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 125.485119][ T7616] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 01:04:44 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x300, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:44 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 125.493075][ T7616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 125.501026][ T7616] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 125.520707][ T7615] EXT4-fs (loop2): unsupported descriptor size 0 01:04:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x500, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 125.565406][ T7628] EXT4-fs (loop1): invalid first ino: 0 01:04:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:44 executing program 0 (fault-call:11 fault-nth:5): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:44 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x4000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 125.670987][ T7638] EXT4-fs (loop2): unsupported descriptor size 0 [ 125.682055][ T7643] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 125.691264][ T7648] FAULT_INJECTION: forcing a failure. [ 125.691264][ T7648] name failslab, interval 1, probability 0, space 0, times 0 [ 125.703935][ T7648] CPU: 1 PID: 7648 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 125.713992][ T7648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.724050][ T7648] Call Trace: [ 125.727333][ T7648] dump_stack+0x1b0/0x21e [ 125.731656][ T7648] ? devkmsg_release+0x11c/0x11c [ 125.736859][ T7648] ? show_regs_print_info+0x12/0x12 [ 125.742056][ T7648] ? __es_remove_extent+0x14a1/0x2290 [ 125.747416][ T7648] should_fail+0x6fb/0x860 [ 125.751825][ T7648] ? setup_fault_attr+0x2b0/0x2b0 [ 125.756832][ T7648] ? __es_insert_extent+0x7a4/0x1770 [ 125.762093][ T7648] should_failslab+0x5/0x20 [ 125.766574][ T7648] kmem_cache_alloc+0x36/0x250 [ 125.771318][ T7648] __es_insert_extent+0x7a4/0x1770 [ 125.776429][ T7648] ext4_es_insert_extent+0x42b/0x2f40 [ 125.781804][ T7648] ? ext4_es_scan_clu+0x270/0x270 [ 125.786809][ T7648] ? ext4_map_blocks+0x8d8/0x1e30 [ 125.791817][ T7648] ext4_map_blocks+0xe27/0x1e30 [ 125.796744][ T7648] ? ext4_issue_zeroout+0x160/0x160 [ 125.801921][ T7648] ? write_end_fn+0x150/0x150 [ 125.806590][ T7648] ? setup_fault_attr+0x2b0/0x2b0 [ 125.811595][ T7648] ? slab_free_freelist_hook+0xd0/0x150 [ 125.817129][ T7648] mpage_map_one_extent+0x2d4/0x960 [ 125.822309][ T7648] ? __ext4_journal_start_sb+0x3ad/0x420 [ 125.827933][ T7648] ext4_writepages+0x1d57/0x3d10 [ 125.832861][ T7648] ? ext4_readpage+0x2b0/0x2b0 [ 125.837975][ T7648] ? ext4_get_inode_loc+0x60/0x60 [ 125.842986][ T7648] ? is_bpf_text_address+0x290/0x2b0 [ 125.848273][ T7648] ? __brelse+0x55/0x90 [ 125.852411][ T7648] ? ext4_xattr_ibody_get+0x415/0xba0 [ 125.857791][ T7648] ? __up_read+0x6f/0x1b0 [ 125.862117][ T7648] ? ext4_attr_store+0x740/0x740 [ 125.867057][ T7648] ? ext4_readpage+0x2b0/0x2b0 [ 125.871817][ T7648] do_writepages+0x12e/0x290 [ 125.876437][ T7648] ? __writepage+0xc0/0xc0 [ 125.880841][ T7648] ? ext4_xattr_get+0x5a9/0x810 [ 125.885775][ T7648] filemap_write_and_wait_range+0x3b8/0x470 [ 125.891673][ T7648] ? filemap_write_and_wait+0x430/0x430 [ 125.897204][ T7648] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 125.902906][ T7648] generic_file_direct_write+0x18b/0x6c0 [ 125.908521][ T7648] ? pagecache_write_end+0xa0/0xa0 [ 125.913621][ T7648] ? file_update_time+0x2cf/0x3d0 [ 125.918622][ T7648] ? file_remove_privs+0x600/0x600 [ 125.923712][ T7648] ? ext4_issue_zeroout+0x160/0x160 [ 125.928908][ T7648] __generic_file_write_iter+0x27a/0x460 [ 125.934529][ T7648] ext4_file_write_iter+0x9d0/0x1250 [ 125.939799][ T7648] ? ext4_file_read_iter+0x140/0x140 [ 125.945062][ T7648] ? avc_policy_seqno+0x17/0x70 [ 125.949906][ T7648] ? selinux_file_permission+0x2d0/0x520 [ 125.955530][ T7648] ? security_file_permission+0x128/0x300 [ 125.961227][ T7648] aio_write+0x45d/0x5f0 [ 125.965449][ T7648] ? aio_read+0x4a0/0x4a0 [ 125.969771][ T7648] ? __fget+0x37c/0x3c0 [ 125.973927][ T7648] ? setup_fault_attr+0x2b0/0x2b0 [ 125.978933][ T7648] ? fget_many+0x20/0x20 [ 125.983167][ T7648] ? io_submit_one+0x158/0x2370 [ 125.988008][ T7648] ? kmem_cache_alloc+0x1d5/0x250 [ 125.993015][ T7648] io_submit_one+0xa21/0x2370 [ 125.997674][ T7648] ? lookup_ioctx+0x460/0x460 [ 126.002339][ T7648] ? page_fault+0x2f/0x40 [ 126.006651][ T7648] ? __rcu_read_lock+0x50/0x50 [ 126.011391][ T7648] ? __se_sys_io_submit+0x90/0x380 [ 126.016481][ T7648] ? lookup_ioctx+0x26e/0x460 [ 126.021137][ T7648] ? security_file_permission+0x128/0x300 [ 126.026836][ T7648] __se_sys_io_submit+0x169/0x380 [ 126.031842][ T7648] ? fput_many+0x42/0x1a0 [ 126.036156][ T7648] ? __x64_sys_io_submit+0x80/0x80 [ 126.041263][ T7648] ? ksys_write+0x237/0x2a0 [ 126.045758][ T7648] ? __ia32_sys_read+0x80/0x80 [ 126.050588][ T7648] ? fput_many+0x42/0x1a0 [ 126.054897][ T7648] do_syscall_64+0xcb/0x150 [ 126.059407][ T7648] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.065278][ T7648] RIP: 0033:0x45de89 [ 126.069152][ T7648] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 126.088757][ T7648] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 126.097149][ T7648] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 126.105201][ T7648] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 126.113151][ T7648] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 01:04:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x6000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 126.121114][ T7648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 126.129064][ T7648] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 126.265478][ T7655] EXT4-fs (loop2): unsupported descriptor size 0 01:04:45 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x8100, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:45 executing program 0 (fault-call:11 fault-nth:6): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:45 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x8e00, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 126.442474][ T7667] EXT4-fs (loop2): unsupported descriptor size 0 [ 126.448005][ T7666] FAULT_INJECTION: forcing a failure. [ 126.448005][ T7666] name failslab, interval 1, probability 0, space 0, times 0 [ 126.461667][ T7666] CPU: 1 PID: 7666 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 126.471719][ T7666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.481783][ T7666] Call Trace: [ 126.485047][ T7666] dump_stack+0x1b0/0x21e [ 126.489350][ T7666] ? devkmsg_release+0x11c/0x11c [ 126.494274][ T7666] ? show_regs_print_info+0x12/0x12 [ 126.499467][ T7666] ? cpumask_any_but+0x85/0xc0 [ 126.504232][ T7666] should_fail+0x6fb/0x860 [ 126.508622][ T7666] ? setup_fault_attr+0x2b0/0x2b0 [ 126.513617][ T7666] ? page_vma_mapped_walk+0x1d5/0x700 [ 126.518973][ T7666] ? ptep_clear_flush+0x111/0x150 [ 126.523970][ T7666] ? mempool_alloc_slab+0x16/0x30 [ 126.528972][ T7666] ? mempool_free+0x380/0x380 [ 126.533638][ T7666] should_failslab+0x5/0x20 [ 126.538125][ T7666] kmem_cache_alloc+0x36/0x250 [ 126.542863][ T7666] ? _raw_spin_lock_irqsave+0xda/0x1c0 [ 126.548305][ T7666] ? mempool_free+0x380/0x380 [ 126.552960][ T7666] mempool_alloc_slab+0x16/0x30 [ 126.557784][ T7666] mempool_alloc+0x100/0x650 [ 126.562358][ T7666] ? _raw_spin_lock+0x170/0x170 [ 126.567209][ T7666] ? mempool_resize+0x910/0x910 [ 126.572031][ T7666] ? xas_clear_mark+0x1ce/0x220 [ 126.576851][ T7666] ? __test_set_page_writeback+0x839/0x990 [ 126.582632][ T7666] bio_alloc_bioset+0x1fc/0x660 [ 126.587456][ T7666] ? bio_chain_endio+0xf0/0xf0 [ 126.592197][ T7666] ? percpu_counter_add_batch+0x12d/0x150 [ 126.597977][ T7666] ext4_bio_write_page+0xfd6/0x17a0 [ 126.603157][ T7666] mpage_submit_page+0x1ae/0x230 [ 126.608102][ T7666] ext4_writepages+0x21f4/0x3d10 [ 126.613039][ T7666] ? ext4_readpage+0x2b0/0x2b0 [ 126.617785][ T7666] ? ext4_get_inode_loc+0x60/0x60 [ 126.622782][ T7666] ? is_bpf_text_address+0x290/0x2b0 [ 126.628055][ T7666] ? __brelse+0x55/0x90 [ 126.632197][ T7666] ? ext4_xattr_ibody_get+0x415/0xba0 [ 126.637539][ T7666] ? __up_read+0x6f/0x1b0 [ 126.641839][ T7666] ? ext4_attr_store+0x740/0x740 [ 126.646748][ T7666] ? ext4_readpage+0x2b0/0x2b0 [ 126.651482][ T7666] do_writepages+0x12e/0x290 [ 126.656071][ T7666] ? __writepage+0xc0/0xc0 [ 126.660557][ T7666] ? ext4_xattr_get+0x5a9/0x810 [ 126.665378][ T7666] filemap_write_and_wait_range+0x3b8/0x470 [ 126.671245][ T7666] ? filemap_write_and_wait+0x430/0x430 [ 126.676764][ T7666] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 126.682459][ T7666] generic_file_direct_write+0x18b/0x6c0 [ 126.688082][ T7666] ? pagecache_write_end+0xa0/0xa0 [ 126.693168][ T7666] ? file_update_time+0x2cf/0x3d0 [ 126.699118][ T7666] ? file_remove_privs+0x600/0x600 [ 126.704912][ T7666] ? ext4_issue_zeroout+0x160/0x160 [ 126.710112][ T7666] __generic_file_write_iter+0x27a/0x460 [ 126.715717][ T7666] ext4_file_write_iter+0x9d0/0x1250 [ 126.720979][ T7666] ? ext4_file_read_iter+0x140/0x140 [ 126.726261][ T7666] ? avc_policy_seqno+0x17/0x70 [ 126.731087][ T7666] ? selinux_file_permission+0x2d0/0x520 [ 126.736712][ T7666] ? security_file_permission+0x128/0x300 [ 126.742402][ T7666] aio_write+0x45d/0x5f0 [ 126.746702][ T7666] ? aio_read+0x4a0/0x4a0 [ 126.751024][ T7666] ? __fget+0x37c/0x3c0 [ 126.755158][ T7666] ? setup_fault_attr+0x2b0/0x2b0 [ 126.760162][ T7666] ? fget_many+0x20/0x20 [ 126.764375][ T7666] ? io_submit_one+0x158/0x2370 [ 126.769194][ T7666] ? kmem_cache_alloc+0x1d5/0x250 [ 126.774205][ T7666] io_submit_one+0xa21/0x2370 [ 126.778872][ T7666] ? lookup_ioctx+0x460/0x460 [ 126.783534][ T7666] ? page_fault+0x2f/0x40 [ 126.787834][ T7666] ? __rcu_read_lock+0x50/0x50 [ 126.792568][ T7666] ? __se_sys_io_submit+0x90/0x380 [ 126.797658][ T7666] ? lookup_ioctx+0x26e/0x460 [ 126.802307][ T7666] ? security_file_permission+0x128/0x300 [ 126.807995][ T7666] __se_sys_io_submit+0x169/0x380 [ 126.813007][ T7666] ? fput_many+0x42/0x1a0 [ 126.817311][ T7666] ? __x64_sys_io_submit+0x80/0x80 [ 126.822412][ T7666] ? ksys_write+0x237/0x2a0 [ 126.826907][ T7666] ? __ia32_sys_read+0x80/0x80 [ 126.831649][ T7666] ? fput_many+0x42/0x1a0 [ 126.835951][ T7666] do_syscall_64+0xcb/0x150 [ 126.840441][ T7666] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.846302][ T7666] RIP: 0033:0x45de89 [ 126.850167][ T7666] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 126.870096][ T7666] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 126.879613][ T7666] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 01:04:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 126.887584][ T7666] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 126.895556][ T7666] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 126.903517][ T7666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 126.911641][ T7666] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:46 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:46 executing program 0 (fault-call:11 fault-nth:7): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 126.955765][ T7673] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 127.005608][ T7688] EXT4-fs (loop2): unsupported descriptor size 0 [ 127.010984][ T7698] FAULT_INJECTION: forcing a failure. [ 127.010984][ T7698] name failslab, interval 1, probability 0, space 0, times 0 [ 127.024558][ T7698] CPU: 0 PID: 7698 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 127.034589][ T7698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.044626][ T7698] Call Trace: [ 127.047906][ T7698] dump_stack+0x1b0/0x21e [ 127.052213][ T7698] ? devkmsg_release+0x11c/0x11c [ 127.057122][ T7698] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.064222][ T7698] ? show_regs_print_info+0x12/0x12 [ 127.069407][ T7698] ? setup_fault_attr+0x2b0/0x2b0 [ 127.074430][ T7698] should_fail+0x6fb/0x860 [ 127.078831][ T7698] ? setup_fault_attr+0x2b0/0x2b0 [ 127.083827][ T7698] ? should_fail+0x182/0x860 [ 127.088389][ T7698] ? flush_tlb_mm_range+0x17a/0x220 [ 127.093581][ T7698] ? setup_fault_attr+0x2b0/0x2b0 [ 127.098608][ T7698] ? page_vma_mapped_walk+0x1d5/0x700 [ 127.103962][ T7698] ? mempool_alloc_slab+0x16/0x30 [ 127.108956][ T7698] ? mempool_free+0x380/0x380 [ 127.113602][ T7698] should_failslab+0x5/0x20 [ 127.118090][ T7698] kmem_cache_alloc+0x36/0x250 [ 127.122833][ T7698] ? mempool_free+0x380/0x380 [ 127.127499][ T7698] mempool_alloc_slab+0x16/0x30 [ 127.132337][ T7698] mempool_alloc+0x100/0x650 [ 127.136916][ T7698] ? mempool_alloc_slab+0x25/0x30 [ 127.143743][ T7698] ? _raw_spin_lock+0x170/0x170 [ 127.148592][ T7698] ? mempool_resize+0x910/0x910 [ 127.153847][ T7698] ? mempool_resize+0x910/0x910 [ 127.158671][ T7698] ? __test_set_page_writeback+0x839/0x990 [ 127.164449][ T7698] bvec_alloc+0x149/0x190 [ 127.168768][ T7698] bio_alloc_bioset+0x3a5/0x660 [ 127.173609][ T7698] ? bio_chain_endio+0xf0/0xf0 [ 127.178370][ T7698] ? percpu_counter_add_batch+0x12d/0x150 [ 127.184247][ T7698] ext4_bio_write_page+0xfd6/0x17a0 [ 127.189432][ T7698] mpage_submit_page+0x1ae/0x230 [ 127.194393][ T7698] ext4_writepages+0x21f4/0x3d10 [ 127.199507][ T7698] ? ext4_readpage+0x2b0/0x2b0 [ 127.204256][ T7698] ? __ext4_handle_dirty_metadata+0x2d8/0x900 [ 127.210379][ T7698] ? ext4_get_group_desc+0x253/0x2a0 [ 127.215652][ T7698] ? __ext4_journal_get_create_access+0x300/0x300 [ 127.222045][ T7698] ? __ext4_get_inode_loc+0x499/0x1030 [ 127.227486][ T7698] ? ext4_mark_iloc_dirty+0x245f/0x3400 [ 127.233051][ T7698] ? ext4_readpage+0x2b0/0x2b0 [ 127.237796][ T7698] do_writepages+0x12e/0x290 [ 127.242378][ T7698] ? ext4_chunk_trans_blocks+0x280/0x280 [ 127.247984][ T7698] ? __writepage+0xc0/0xc0 [ 127.252397][ T7698] ? ext4_reserve_inode_write+0x19c/0x220 [ 127.258099][ T7698] ? ext4_mark_inode_dirty+0x5b0/0x730 [ 127.263543][ T7698] filemap_write_and_wait_range+0x3b8/0x470 [ 127.269447][ T7698] ? filemap_write_and_wait+0x430/0x430 [ 127.274972][ T7698] ? __ext4_journal_start_sb+0x3ad/0x420 [ 127.280587][ T7698] ? __ext4_journal_stop+0x2f/0x190 [ 127.285756][ T7698] ? __ext4_expand_extra_isize+0x3b0/0x3b0 [ 127.291531][ T7698] generic_file_direct_write+0x18b/0x6c0 [ 127.297135][ T7698] ? pagecache_write_end+0xa0/0xa0 [ 127.302222][ T7698] ? file_update_time+0x36a/0x3d0 [ 127.307242][ T7698] ? file_remove_privs+0x600/0x600 [ 127.312337][ T7698] ? ext4_issue_zeroout+0x160/0x160 [ 127.317507][ T7698] __generic_file_write_iter+0x27a/0x460 [ 127.323993][ T7698] ext4_file_write_iter+0x9d0/0x1250 [ 127.329251][ T7698] ? ext4_file_read_iter+0x140/0x140 [ 127.335472][ T7698] ? avc_policy_seqno+0x17/0x70 [ 127.340306][ T7698] ? selinux_file_permission+0x2d0/0x520 [ 127.345907][ T7698] ? security_file_permission+0x128/0x300 [ 127.351604][ T7698] aio_write+0x45d/0x5f0 [ 127.355824][ T7698] ? aio_read+0x4a0/0x4a0 [ 127.360123][ T7698] ? __fget+0x37c/0x3c0 [ 127.364266][ T7698] ? setup_fault_attr+0x2b0/0x2b0 [ 127.369267][ T7698] ? fget_many+0x20/0x20 [ 127.373499][ T7698] ? io_submit_one+0x158/0x2370 [ 127.378358][ T7698] ? kmem_cache_alloc+0x1d5/0x250 [ 127.383367][ T7698] io_submit_one+0xa21/0x2370 [ 127.388026][ T7698] ? lookup_ioctx+0x460/0x460 [ 127.392748][ T7698] ? page_fault+0x2f/0x40 [ 127.397052][ T7698] ? __rcu_read_lock+0x50/0x50 [ 127.401827][ T7698] ? __se_sys_io_submit+0x90/0x380 [ 127.406916][ T7698] ? lookup_ioctx+0x26e/0x460 [ 127.411577][ T7698] ? security_file_permission+0x128/0x300 [ 127.417266][ T7698] __se_sys_io_submit+0x169/0x380 [ 127.423057][ T7698] ? fput_many+0x42/0x1a0 [ 127.427361][ T7698] ? __x64_sys_io_submit+0x80/0x80 [ 127.432460][ T7698] ? ksys_write+0x237/0x2a0 [ 127.437055][ T7698] ? __ia32_sys_read+0x80/0x80 [ 127.441787][ T7698] ? fput_many+0x42/0x1a0 [ 127.446088][ T7698] do_syscall_64+0xcb/0x150 [ 127.450573][ T7698] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.456439][ T7698] RIP: 0033:0x45de89 [ 127.460308][ T7698] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 127.479896][ T7698] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 127.488285][ T7698] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 127.496264][ T7698] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 01:04:46 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:46 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 127.504210][ T7698] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 127.512172][ T7698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 127.520114][ T7698] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 127.546456][ T7697] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 01:04:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:46 executing program 0 (fault-call:11 fault-nth:8): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 127.622901][ T7713] FAULT_INJECTION: forcing a failure. [ 127.622901][ T7713] name failslab, interval 1, probability 0, space 0, times 0 [ 127.635979][ T7713] CPU: 0 PID: 7713 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 127.646036][ T7713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.656062][ T7713] Call Trace: [ 127.659343][ T7713] dump_stack+0x1b0/0x21e [ 127.663903][ T7713] ? devkmsg_release+0x11c/0x11c [ 127.669770][ T7713] ? kmem_cache_alloc+0x1d5/0x250 [ 127.674783][ T7713] ? show_regs_print_info+0x12/0x12 [ 127.679952][ T7713] ? bio_alloc_bioset+0x3a5/0x660 [ 127.684946][ T7713] ? mpage_submit_page+0x1ae/0x230 [ 127.690028][ T7713] ? ext4_writepages+0x21f4/0x3d10 [ 127.695223][ T7713] ? do_writepages+0x12e/0x290 [ 127.699962][ T7713] ? generic_file_direct_write+0x18b/0x6c0 [ 127.705759][ T7713] ? __generic_file_write_iter+0x27a/0x460 [ 127.711545][ T7713] ? ext4_file_write_iter+0x9d0/0x1250 [ 127.717015][ T7713] should_fail+0x6fb/0x860 [ 127.721404][ T7713] ? setup_fault_attr+0x2b0/0x2b0 [ 127.726422][ T7713] ? blk_partition_remap+0x4a0/0x8a0 [ 127.731697][ T7713] ? create_task_io_context+0x28/0x3a0 [ 127.737125][ T7713] should_failslab+0x5/0x20 [ 127.741615][ T7713] kmem_cache_alloc+0x36/0x250 [ 127.746371][ T7713] ? cpumask_any_but+0xab/0xc0 [ 127.751214][ T7713] create_task_io_context+0x28/0x3a0 [ 127.756474][ T7713] generic_make_request_checks+0xc55/0xf10 [ 127.762276][ T7713] ? generic_make_request+0xde0/0xde0 [ 127.767633][ T7713] ? mempool_alloc+0x10d/0x650 [ 127.772370][ T7713] ? mempool_alloc_slab+0x25/0x30 [ 127.777381][ T7713] ? _raw_spin_lock+0x170/0x170 [ 127.782200][ T7713] ? mempool_resize+0x910/0x910 [ 127.787020][ T7713] generic_make_request+0xa7/0xde0 [ 127.792118][ T7713] ? blk_attempt_plug_merge+0x310/0x310 [ 127.797634][ T7713] ? free_unref_page_commit+0x380/0x380 [ 127.803150][ T7713] ? mpage_release_unused_pages+0x17c/0x5e0 [ 127.809033][ T7713] submit_bio+0x11f/0x520 [ 127.813351][ T7713] ? release_pages+0x9b4/0x9f0 [ 127.818100][ T7713] ? direct_make_request+0x430/0x430 [ 127.823369][ T7713] ? lru_add_drain_per_cpu+0x50/0x50 [ 127.828647][ T7713] ext4_io_submit+0x151/0x200 [ 127.833298][ T7713] ext4_writepages+0x2588/0x3d10 [ 127.838210][ T7713] ? ext4_readpage+0x2b0/0x2b0 [ 127.842946][ T7713] ? ext4_get_inode_loc+0x60/0x60 [ 127.847946][ T7713] ? is_bpf_text_address+0x290/0x2b0 [ 127.853249][ T7713] ? __brelse+0x54/0x90 [ 127.857377][ T7713] ? ext4_xattr_ibody_get+0x415/0xba0 [ 127.862762][ T7713] ? __up_read+0x6f/0x1b0 [ 127.867075][ T7713] ? ext4_attr_store+0x740/0x740 [ 127.872013][ T7713] ? ext4_readpage+0x2b0/0x2b0 [ 127.876752][ T7713] do_writepages+0x12e/0x290 [ 127.881318][ T7713] ? __writepage+0xc0/0xc0 [ 127.885707][ T7713] ? ext4_xattr_get+0x5a9/0x810 [ 127.890530][ T7713] filemap_write_and_wait_range+0x3b8/0x470 [ 127.896434][ T7713] ? filemap_write_and_wait+0x430/0x430 [ 127.901952][ T7713] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 127.907649][ T7713] generic_file_direct_write+0x18b/0x6c0 [ 127.913272][ T7713] ? pagecache_write_end+0xa0/0xa0 [ 127.918367][ T7713] ? file_update_time+0x2cf/0x3d0 [ 127.923450][ T7713] ? file_remove_privs+0x600/0x600 [ 127.928544][ T7713] ? ext4_issue_zeroout+0x160/0x160 [ 127.933736][ T7713] __generic_file_write_iter+0x27a/0x460 [ 127.939356][ T7713] ext4_file_write_iter+0x9d0/0x1250 [ 127.944628][ T7713] ? ext4_file_read_iter+0x140/0x140 [ 127.949895][ T7713] ? avc_policy_seqno+0x17/0x70 [ 127.954723][ T7713] ? selinux_file_permission+0x2d0/0x520 [ 127.960352][ T7713] ? security_file_permission+0x128/0x300 [ 127.966751][ T7713] aio_write+0x45d/0x5f0 [ 127.970965][ T7713] ? aio_read+0x4a0/0x4a0 [ 127.975264][ T7713] ? __fget+0x37c/0x3c0 [ 127.979394][ T7713] ? setup_fault_attr+0x2b0/0x2b0 [ 127.984561][ T7713] ? fget_many+0x20/0x20 [ 127.988773][ T7713] ? io_submit_one+0x158/0x2370 [ 127.993597][ T7713] ? kmem_cache_alloc+0x1d5/0x250 [ 127.998595][ T7713] io_submit_one+0xa21/0x2370 [ 128.003281][ T7713] ? lookup_ioctx+0x460/0x460 [ 128.007932][ T7713] ? page_fault+0x2f/0x40 [ 128.012247][ T7713] ? __rcu_read_lock+0x50/0x50 [ 128.017007][ T7713] ? __se_sys_io_submit+0x90/0x380 [ 128.022102][ T7713] ? lookup_ioctx+0x26e/0x460 [ 128.026905][ T7713] ? security_file_permission+0x128/0x300 [ 128.032601][ T7713] __se_sys_io_submit+0x169/0x380 [ 128.037594][ T7713] ? fput_many+0x42/0x1a0 [ 128.041982][ T7713] ? __x64_sys_io_submit+0x80/0x80 [ 128.047410][ T7713] ? ksys_write+0x237/0x2a0 [ 128.051881][ T7713] ? __ia32_sys_read+0x80/0x80 [ 128.056620][ T7713] ? fput_many+0x42/0x1a0 [ 128.060929][ T7713] do_syscall_64+0xcb/0x150 [ 128.065410][ T7713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.071292][ T7713] RIP: 0033:0x45de89 [ 128.075158][ T7713] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 128.094740][ T7713] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 128.103157][ T7713] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 128.111110][ T7713] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 01:04:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 128.119073][ T7713] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 128.127024][ T7713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 128.134998][ T7713] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:47 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 128.170497][ T7711] EXT4-fs (loop2): unsupported descriptor size 0 01:04:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:47 executing program 0 (fault-call:11 fault-nth:9): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 128.224569][ T7720] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 128.272604][ T7729] EXT4-fs (loop2): unsupported descriptor size 0 [ 128.339455][ T7739] FAULT_INJECTION: forcing a failure. [ 128.339455][ T7739] name failslab, interval 1, probability 0, space 0, times 0 [ 128.355247][ T7739] CPU: 1 PID: 7739 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 128.365331][ T7739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.369356][ T7735] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 128.375506][ T7739] Call Trace: [ 128.375525][ T7739] dump_stack+0x1b0/0x21e [ 128.375536][ T7739] ? devkmsg_release+0x11c/0x11c [ 128.375551][ T7739] ? show_regs_print_info+0x12/0x12 [ 128.401349][ T7739] ? mpage_release_unused_pages+0x17c/0x5e0 [ 128.407235][ T7739] should_fail+0x6fb/0x860 [ 128.411645][ T7739] ? setup_fault_attr+0x2b0/0x2b0 [ 128.416653][ T7739] ? lru_add_drain_per_cpu+0x50/0x50 [ 128.421921][ T7739] ? ext4_init_io_end+0x25/0xf0 [ 128.426816][ T7739] should_failslab+0x5/0x20 [ 128.431291][ T7739] kmem_cache_alloc+0x36/0x250 [ 128.436076][ T7739] ext4_init_io_end+0x25/0xf0 [ 128.440800][ T7739] ext4_writepages+0x157d/0x3d10 [ 128.445717][ T7739] ? ext4_readpage+0x2b0/0x2b0 [ 128.450450][ T7739] ? ext4_get_inode_loc+0x60/0x60 [ 128.455442][ T7739] ? is_bpf_text_address+0x290/0x2b0 [ 128.460696][ T7739] ? __brelse+0x54/0x90 [ 128.464820][ T7739] ? ext4_xattr_ibody_get+0x415/0xba0 [ 128.470191][ T7739] ? __up_read+0x6f/0x1b0 [ 128.474521][ T7739] ? ext4_attr_store+0x740/0x740 [ 128.479426][ T7739] ? ext4_readpage+0x2b0/0x2b0 [ 128.484169][ T7739] do_writepages+0x12e/0x290 [ 128.488735][ T7739] ? __writepage+0xc0/0xc0 [ 128.493140][ T7739] ? ext4_xattr_get+0x5a9/0x810 [ 128.497958][ T7739] filemap_write_and_wait_range+0x3b8/0x470 [ 128.503831][ T7739] ? filemap_write_and_wait+0x430/0x430 [ 128.509348][ T7739] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 128.515054][ T7739] generic_file_direct_write+0x18b/0x6c0 [ 128.520654][ T7739] ? pagecache_write_end+0xa0/0xa0 [ 128.525740][ T7739] ? file_update_time+0x2cf/0x3d0 [ 128.530737][ T7739] ? file_remove_privs+0x600/0x600 [ 128.535825][ T7739] ? ext4_issue_zeroout+0x160/0x160 [ 128.541016][ T7739] __generic_file_write_iter+0x27a/0x460 [ 128.546631][ T7739] ext4_file_write_iter+0x9d0/0x1250 [ 128.551885][ T7739] ? ext4_file_read_iter+0x140/0x140 [ 128.557139][ T7739] ? avc_policy_seqno+0x17/0x70 [ 128.561959][ T7739] ? selinux_file_permission+0x2d0/0x520 [ 128.567646][ T7739] ? security_file_permission+0x128/0x300 [ 128.573352][ T7739] aio_write+0x45d/0x5f0 [ 128.577584][ T7739] ? aio_read+0x4a0/0x4a0 [ 128.581910][ T7739] ? __fget+0x37c/0x3c0 [ 128.586053][ T7739] ? setup_fault_attr+0x2b0/0x2b0 [ 128.591046][ T7739] ? fget_many+0x20/0x20 [ 128.595270][ T7739] ? io_submit_one+0x158/0x2370 [ 128.600089][ T7739] ? kmem_cache_alloc+0x1d5/0x250 [ 128.605092][ T7739] io_submit_one+0xa21/0x2370 [ 128.609736][ T7739] ? lookup_ioctx+0x460/0x460 [ 128.614392][ T7739] ? page_fault+0x2f/0x40 [ 128.618702][ T7739] ? __rcu_read_lock+0x50/0x50 [ 128.623432][ T7739] ? __se_sys_io_submit+0x90/0x380 [ 128.628526][ T7739] ? lookup_ioctx+0x26e/0x460 [ 128.633180][ T7739] ? security_file_permission+0x128/0x300 [ 128.638887][ T7739] __se_sys_io_submit+0x169/0x380 [ 128.643892][ T7739] ? fput_many+0x42/0x1a0 [ 128.648190][ T7739] ? __x64_sys_io_submit+0x80/0x80 [ 128.653276][ T7739] ? ksys_write+0x237/0x2a0 [ 128.657747][ T7739] ? __ia32_sys_read+0x80/0x80 [ 128.662475][ T7739] ? fput_many+0x42/0x1a0 [ 128.666797][ T7739] do_syscall_64+0xcb/0x150 [ 128.671269][ T7739] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.677141][ T7739] RIP: 0033:0x45de89 [ 128.681021][ T7739] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 128.700616][ T7739] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 128.709008][ T7739] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 128.716949][ T7739] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 128.724889][ T7739] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 128.732829][ T7739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 128.740774][ T7739] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:47 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:47 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:47 executing program 0 (fault-call:11 fault-nth:10): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 128.833954][ T7746] EXT4-fs (loop2): unsupported descriptor size 0 [ 128.843556][ T7747] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 01:04:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x40000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:47 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 128.913940][ T7763] FAULT_INJECTION: forcing a failure. [ 128.913940][ T7763] name failslab, interval 1, probability 0, space 0, times 0 [ 128.927123][ T7763] CPU: 0 PID: 7763 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 128.937186][ T7763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.947212][ T7763] Call Trace: [ 128.950476][ T7763] dump_stack+0x1b0/0x21e [ 128.954775][ T7763] ? devkmsg_release+0x11c/0x11c [ 128.959700][ T7763] ? show_regs_print_info+0x12/0x12 [ 128.964881][ T7763] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.970919][ T7763] should_fail+0x6fb/0x860 [ 128.975305][ T7763] ? setup_fault_attr+0x2b0/0x2b0 [ 128.980305][ T7763] ? is_bpf_text_address+0x290/0x2b0 [ 128.985571][ T7763] ? stack_trace_save+0x1e0/0x1e0 [ 128.990566][ T7763] ? __blockdev_direct_IO+0x38b/0x4910 [ 128.995993][ T7763] should_failslab+0x5/0x20 [ 129.000466][ T7763] kmem_cache_alloc+0x36/0x250 [ 129.005199][ T7763] __blockdev_direct_IO+0x38b/0x4910 [ 129.010478][ T7763] ? stack_trace_save+0x111/0x1e0 [ 129.017498][ T7763] ? stack_trace_snprint+0x150/0x150 [ 129.022765][ T7763] ? sched_clock+0x5/0x10 [ 129.027066][ T7763] ? free_unref_page_commit+0x380/0x380 [ 129.032593][ T7763] ? ext4_dio_get_block_unwritten_async+0x280/0x280 [ 129.039161][ T7763] ? kmem_cache_free+0xac/0x5c0 [ 129.043984][ T7763] ? __kasan_slab_free+0x1e2/0x220 [ 129.049063][ T7763] ? __kasan_slab_free+0x168/0x220 [ 129.054148][ T7763] ? slab_free_freelist_hook+0xd0/0x150 [ 129.059662][ T7763] ? kmem_cache_free+0xac/0x5c0 [ 129.064488][ T7763] ? free_buffer_head+0x4f/0x230 [ 129.069393][ T7763] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 129.075863][ T7763] ? invalidate_inode_pages2_range+0x7ad/0xd50 [ 129.082001][ T7763] ? generic_file_direct_write+0x3cc/0x6c0 [ 129.087820][ T7763] ? __generic_file_write_iter+0x27a/0x460 [ 129.093649][ T7763] ? ext4_file_write_iter+0x9d0/0x1250 [ 129.099075][ T7763] ? aio_write+0x45d/0x5f0 [ 129.103479][ T7763] ? io_submit_one+0xa21/0x2370 [ 129.108305][ T7763] ? __se_sys_io_submit+0x169/0x380 [ 129.113474][ T7763] ? do_syscall_64+0xcb/0x150 [ 129.119205][ T7763] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.125374][ T7763] ? find_next_bit+0xd8/0x120 [ 129.130039][ T7763] ? lru_add_drain_per_cpu+0x50/0x50 [ 129.135306][ T7763] ? sb_init_dio_done_wq+0x80/0x80 [ 129.140405][ T7763] ? __mod_lruvec_state+0x51/0x3a0 [ 129.145493][ T7763] ? release_pages+0x9b4/0x9f0 [ 129.150235][ T7763] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 129.156701][ T7763] ext4_direct_IO+0x1591/0x20f0 [ 129.161521][ T7763] ? ext4_releasepage+0x280/0x280 [ 129.166531][ T7763] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 129.173275][ T7763] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 129.178963][ T7763] ? __writepage+0xc0/0xc0 [ 129.183347][ T7763] ? ext4_xattr_get+0x5a9/0x810 [ 129.188169][ T7763] ? filemap_check_errors+0xcf/0x110 [ 129.193422][ T7763] ? filemap_write_and_wait+0x430/0x430 [ 129.198935][ T7763] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 129.204728][ T7763] generic_file_direct_write+0x45b/0x6c0 [ 129.210385][ T7763] ? pagecache_write_end+0xa0/0xa0 [ 129.215465][ T7763] ? file_update_time+0x2cf/0x3d0 [ 129.220466][ T7763] ? file_remove_privs+0x600/0x600 [ 129.225545][ T7763] ? ext4_issue_zeroout+0x160/0x160 [ 129.230713][ T7763] __generic_file_write_iter+0x27a/0x460 [ 129.236336][ T7763] ext4_file_write_iter+0x9d0/0x1250 [ 129.241590][ T7763] ? ext4_file_read_iter+0x140/0x140 [ 129.246860][ T7763] ? avc_policy_seqno+0x17/0x70 [ 129.251704][ T7763] ? selinux_file_permission+0x2d0/0x520 [ 129.257323][ T7763] ? security_file_permission+0x128/0x300 [ 129.263018][ T7763] aio_write+0x45d/0x5f0 [ 129.267234][ T7763] ? aio_read+0x4a0/0x4a0 [ 129.271533][ T7763] ? __fget+0x37c/0x3c0 [ 129.275669][ T7763] ? setup_fault_attr+0x2b0/0x2b0 [ 129.280661][ T7763] ? fget_many+0x20/0x20 [ 129.284875][ T7763] ? io_submit_one+0x158/0x2370 [ 129.289698][ T7763] ? kmem_cache_alloc+0x1d5/0x250 [ 129.294718][ T7763] io_submit_one+0xa21/0x2370 [ 129.299377][ T7763] ? lookup_ioctx+0x460/0x460 [ 129.304038][ T7763] ? page_fault+0x2f/0x40 [ 129.308341][ T7763] ? __rcu_read_lock+0x50/0x50 [ 129.313085][ T7763] ? __se_sys_io_submit+0x90/0x380 [ 129.318163][ T7763] ? lookup_ioctx+0x26e/0x460 [ 129.322810][ T7763] ? security_file_permission+0x128/0x300 [ 129.328503][ T7763] __se_sys_io_submit+0x169/0x380 [ 129.333496][ T7763] ? fput_many+0x42/0x1a0 [ 129.337803][ T7763] ? __x64_sys_io_submit+0x80/0x80 [ 129.342890][ T7763] ? ksys_write+0x237/0x2a0 [ 129.347378][ T7763] ? __ia32_sys_read+0x80/0x80 [ 129.352116][ T7763] ? fput_many+0x42/0x1a0 [ 129.356416][ T7763] do_syscall_64+0xcb/0x150 [ 129.360893][ T7763] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.366818][ T7763] RIP: 0033:0x45de89 [ 129.370686][ T7763] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 129.390263][ T7763] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 129.398645][ T7763] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 129.406585][ T7763] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 129.414528][ T7763] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 129.422483][ T7763] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 129.430539][ T7763] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 129.472707][ T7772] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 129.480985][ T7765] EXT4-fs (loop2): unsupported descriptor size 0 01:04:48 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x81000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:48 executing program 0 (fault-call:11 fault-nth:11): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:48 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 129.687497][ T7786] EXT4-fs (loop2): unsupported descriptor size 0 [ 129.694008][ T7788] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 129.700543][ T7792] FAULT_INJECTION: forcing a failure. [ 129.700543][ T7792] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 129.719536][ T7792] CPU: 0 PID: 7792 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 129.729623][ T7792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.739650][ T7792] Call Trace: [ 129.742918][ T7792] dump_stack+0x1b0/0x21e [ 129.747237][ T7792] ? devkmsg_release+0x11c/0x11c [ 129.752151][ T7792] ? memset+0x1f/0x40 [ 129.756106][ T7792] ? show_regs_print_info+0x12/0x12 [ 129.761281][ T7792] ? unwind_next_frame+0x1c07/0x22b0 [ 129.766558][ T7792] should_fail+0x6fb/0x860 [ 129.770953][ T7792] ? setup_fault_attr+0x2b0/0x2b0 [ 129.775966][ T7792] ? unwind_next_frame+0x1c07/0x22b0 [ 129.781224][ T7792] __alloc_pages_nodemask+0x1ee/0x7c0 [ 129.786569][ T7792] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.792615][ T7792] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 129.798145][ T7792] ? __rcu_read_lock+0x50/0x50 [ 129.802878][ T7792] ? memset+0x1f/0x40 [ 129.806837][ T7792] ? unwind_next_frame+0x1c07/0x22b0 [ 129.812111][ T7792] handle_mm_fault+0x1849/0x4140 [ 129.817021][ T7792] ? finish_fault+0x230/0x230 [ 129.821676][ T7792] ? memset+0x1f/0x40 [ 129.825644][ T7792] ? __rcu_read_lock+0x50/0x50 [ 129.830380][ T7792] ? _raw_spin_unlock+0x5/0x20 [ 129.835126][ T7792] ? follow_page_mask+0x76a/0x1050 [ 129.840209][ T7792] __get_user_pages+0xca0/0x1420 [ 129.845119][ T7792] ? populate_vma_page_range+0xf0/0xf0 [ 129.850546][ T7792] ? gup_pgd_range+0xa0f/0xd70 [ 129.855295][ T7792] ? __init_rwsem+0x120/0x120 [ 129.859956][ T7792] get_user_pages_unlocked+0x179/0x610 [ 129.865389][ T7792] ? ext4_direct_IO+0x1591/0x20f0 [ 129.870396][ T7792] ? get_user_pages_locked+0x4b0/0x4b0 [ 129.875822][ T7792] ? aio_write+0x45d/0x5f0 [ 129.880219][ T7792] ? __se_sys_io_submit+0x169/0x380 [ 129.885402][ T7792] ? do_syscall_64+0xcb/0x150 [ 129.890048][ T7792] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.896083][ T7792] get_user_pages_fast+0x241/0x400 [ 129.901164][ T7792] ? gup_pgd_range+0xd70/0xd70 [ 129.905911][ T7792] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.911947][ T7792] ? __rcu_read_lock+0x50/0x50 [ 129.916695][ T7792] iov_iter_get_pages+0x299/0xea0 [ 129.921690][ T7792] ? stack_trace_save+0x1e0/0x1e0 [ 129.926683][ T7792] ? iov_iter_gap_alignment+0x6c0/0x6c0 [ 129.932195][ T7792] ? iov_iter_npages+0x26e/0x910 [ 129.937119][ T7792] __blockdev_direct_IO+0x1010/0x4910 [ 129.942474][ T7792] ? free_unref_page_commit+0x380/0x380 [ 129.948002][ T7792] ? __se_sys_io_submit+0x169/0x380 [ 129.954386][ T7792] ? find_next_bit+0xd8/0x120 [ 129.959036][ T7792] ? sb_init_dio_done_wq+0x80/0x80 [ 129.964131][ T7792] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 129.970614][ T7792] ? __mod_lruvec_state+0x51/0x3a0 [ 129.976130][ T7792] ? release_pages+0x9b4/0x9f0 [ 129.980863][ T7792] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 129.987332][ T7792] ext4_direct_IO+0x1591/0x20f0 [ 129.992252][ T7792] ? ext4_releasepage+0x280/0x280 [ 129.997260][ T7792] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 130.003469][ T7792] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 130.009155][ T7792] ? __writepage+0xc0/0xc0 [ 130.013558][ T7792] ? ext4_xattr_get+0x5a9/0x810 [ 130.018384][ T7792] ? filemap_check_errors+0xcf/0x110 [ 130.023639][ T7792] ? filemap_write_and_wait+0x430/0x430 [ 130.029156][ T7792] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 130.034859][ T7792] generic_file_direct_write+0x45b/0x6c0 [ 130.040475][ T7792] ? pagecache_write_end+0xa0/0xa0 [ 130.045559][ T7792] ? file_update_time+0x2cf/0x3d0 [ 130.050551][ T7792] ? file_remove_privs+0x600/0x600 [ 130.055644][ T7792] ? ext4_issue_zeroout+0x160/0x160 [ 130.060838][ T7792] __generic_file_write_iter+0x27a/0x460 [ 130.066458][ T7792] ext4_file_write_iter+0x9d0/0x1250 [ 130.071715][ T7792] ? ext4_file_read_iter+0x140/0x140 [ 130.077506][ T7792] ? avc_policy_seqno+0x17/0x70 [ 130.082325][ T7792] ? selinux_file_permission+0x2d0/0x520 [ 130.087937][ T7792] ? security_file_permission+0x128/0x300 [ 130.093630][ T7792] aio_write+0x45d/0x5f0 [ 130.097852][ T7792] ? aio_read+0x4a0/0x4a0 [ 130.102152][ T7792] ? __fget+0x37c/0x3c0 [ 130.106279][ T7792] ? setup_fault_attr+0x2b0/0x2b0 [ 130.111270][ T7792] ? fget_many+0x20/0x20 [ 130.115482][ T7792] ? io_submit_one+0x158/0x2370 [ 130.120309][ T7792] ? kmem_cache_alloc+0x1d5/0x250 [ 130.125305][ T7792] io_submit_one+0xa21/0x2370 [ 130.130007][ T7792] ? lookup_ioctx+0x460/0x460 [ 130.134655][ T7792] ? page_fault+0x2f/0x40 [ 130.138962][ T7792] ? __rcu_read_lock+0x50/0x50 [ 130.143694][ T7792] ? __se_sys_io_submit+0x90/0x380 [ 130.148774][ T7792] ? lookup_ioctx+0x26e/0x460 [ 130.153438][ T7792] ? security_file_permission+0x128/0x300 [ 130.159135][ T7792] __se_sys_io_submit+0x169/0x380 [ 130.164128][ T7792] ? fput_many+0x42/0x1a0 [ 130.168441][ T7792] ? __x64_sys_io_submit+0x80/0x80 [ 130.173539][ T7792] ? ksys_write+0x237/0x2a0 [ 130.178019][ T7792] ? __ia32_sys_read+0x80/0x80 [ 130.182779][ T7792] ? fput_many+0x42/0x1a0 [ 130.187088][ T7792] do_syscall_64+0xcb/0x150 [ 130.191575][ T7792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.197468][ T7792] RIP: 0033:0x45de89 [ 130.201337][ T7792] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 130.220921][ T7792] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 130.229388][ T7792] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 01:04:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x81ffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:49 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(0x0, 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x8e000000, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 130.237343][ T7792] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 130.245304][ T7792] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 130.253289][ T7792] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 130.261239][ T7792] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 130.365467][ T7809] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 130.376230][ T7814] EXT4-fs (loop2): unsupported descriptor size 0 01:04:49 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:49 executing program 0 (fault-call:11 fault-nth:12): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:49 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(0x0, 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 130.549356][ T7826] FAULT_INJECTION: forcing a failure. [ 130.549356][ T7826] name failslab, interval 1, probability 0, space 0, times 0 [ 130.572030][ T7826] CPU: 1 PID: 7826 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 130.582111][ T7826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.592677][ T7826] Call Trace: [ 130.595962][ T7826] dump_stack+0x1b0/0x21e [ 130.600275][ T7826] ? devkmsg_release+0x11c/0x11c [ 130.605196][ T7826] ? show_regs_print_info+0x12/0x12 [ 130.610395][ T7826] should_fail+0x6fb/0x860 [ 130.614808][ T7826] ? setup_fault_attr+0x2b0/0x2b0 [ 130.619832][ T7826] ? get_mem_cgroup_from_mm+0x27b/0x2c0 [ 130.625379][ T7826] ? kcalloc+0x2b/0x50 [ 130.629428][ T7826] should_failslab+0x5/0x20 [ 130.633911][ T7826] __kmalloc+0x5f/0x2c0 [ 130.638051][ T7826] ? mem_cgroup_try_charge_delay+0x10/0x10 [ 130.643835][ T7826] ? memset+0x1f/0x40 [ 130.647812][ T7826] kcalloc+0x2b/0x50 [ 130.651686][ T7826] ext4_find_extent+0x2bb/0xce0 [ 130.656518][ T7826] ? handle_mm_fault+0x138a/0x4140 [ 130.661609][ T7826] ext4_ext_map_blocks+0x344/0x4650 [ 130.666803][ T7826] ? memset+0x1f/0x40 [ 130.671718][ T7826] ? _raw_spin_lock+0xa1/0x170 [ 130.676474][ T7826] ? _raw_spin_trylock_bh+0x190/0x190 [ 130.681828][ T7826] ? ext4_ext_release+0x10/0x10 [ 130.686656][ T7826] ? _raw_spin_unlock+0x5/0x20 [ 130.691423][ T7826] ? follow_page_mask+0xdde/0x1050 [ 130.696513][ T7826] ? vmacache_update+0x9f/0xf0 [ 130.701261][ T7826] ? find_extend_vma+0xc3/0x2a0 [ 130.706089][ T7826] ? down_write+0xd8/0x150 [ 130.710494][ T7826] ? down_read_killable+0x220/0x220 [ 130.715668][ T7826] ? ext4_es_lookup_extent+0x415/0x900 [ 130.721106][ T7826] ext4_map_blocks+0x955/0x1e30 [ 130.725950][ T7826] ? ext4_issue_zeroout+0x160/0x160 [ 130.731139][ T7826] _ext4_get_block+0x214/0x6c0 [ 130.735892][ T7826] ? get_user_pages_fast+0x319/0x400 [ 130.741161][ T7826] ? ext4_get_block+0x40/0x40 [ 130.745821][ T7826] ? __ext4_journal_start_sb+0x3ad/0x420 [ 130.751432][ T7826] ext4_get_block_trans+0x414/0x5a0 [ 130.756606][ T7826] ? ext4_dio_get_block+0xb0/0xb0 [ 130.761609][ T7826] ? iov_iter_advance+0x1e9/0xef0 [ 130.766610][ T7826] ext4_dio_get_block_unwritten_async+0x69/0x280 [ 130.772910][ T7826] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 130.779387][ T7826] __blockdev_direct_IO+0x15ba/0x4910 [ 130.784834][ T7826] ? sb_init_dio_done_wq+0x80/0x80 [ 130.789923][ T7826] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 130.796407][ T7826] ? __mod_lruvec_state+0x51/0x3a0 [ 130.801497][ T7826] ? release_pages+0x9b4/0x9f0 [ 130.806250][ T7826] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 130.812752][ T7826] ext4_direct_IO+0x1591/0x20f0 [ 130.817581][ T7826] ? ext4_releasepage+0x280/0x280 [ 130.822591][ T7826] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 130.828733][ T7826] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 130.834516][ T7826] ? __writepage+0xc0/0xc0 [ 130.838909][ T7826] ? ext4_xattr_get+0x5a9/0x810 [ 130.843752][ T7826] ? filemap_check_errors+0xcf/0x110 [ 130.849016][ T7826] ? filemap_write_and_wait+0x430/0x430 [ 130.857328][ T7826] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 130.863041][ T7826] generic_file_direct_write+0x45b/0x6c0 [ 130.868666][ T7826] ? pagecache_write_end+0xa0/0xa0 [ 130.873754][ T7826] ? file_update_time+0x2cf/0x3d0 [ 130.878758][ T7826] ? file_remove_privs+0x600/0x600 [ 130.883846][ T7826] ? ext4_issue_zeroout+0x160/0x160 [ 130.889038][ T7826] __generic_file_write_iter+0x27a/0x460 [ 130.894648][ T7826] ext4_file_write_iter+0x9d0/0x1250 [ 130.899928][ T7826] ? ext4_file_read_iter+0x140/0x140 [ 130.905193][ T7826] ? avc_policy_seqno+0x17/0x70 [ 130.910022][ T7826] ? selinux_file_permission+0x2d0/0x520 [ 130.915632][ T7826] ? security_file_permission+0x128/0x300 [ 130.921331][ T7826] aio_write+0x45d/0x5f0 [ 130.925549][ T7826] ? aio_read+0x4a0/0x4a0 [ 130.929864][ T7826] ? __fget+0x37c/0x3c0 [ 130.933999][ T7826] ? setup_fault_attr+0x2b0/0x2b0 [ 130.939027][ T7826] ? fget_many+0x20/0x20 [ 130.943285][ T7826] ? io_submit_one+0x158/0x2370 [ 130.948111][ T7826] ? kmem_cache_alloc+0x1d5/0x250 [ 130.953111][ T7826] io_submit_one+0xa21/0x2370 [ 130.957767][ T7826] ? lookup_ioctx+0x460/0x460 [ 130.962418][ T7826] ? page_fault+0x2f/0x40 [ 130.966722][ T7826] ? __rcu_read_lock+0x50/0x50 [ 130.971547][ T7826] ? __se_sys_io_submit+0x90/0x380 [ 130.976646][ T7826] ? lookup_ioctx+0x26e/0x460 [ 130.981305][ T7826] ? security_file_permission+0x128/0x300 [ 130.987001][ T7826] __se_sys_io_submit+0x169/0x380 [ 130.992089][ T7826] ? fput_many+0x42/0x1a0 [ 130.996395][ T7826] ? __x64_sys_io_submit+0x80/0x80 [ 131.001488][ T7826] ? ksys_write+0x237/0x2a0 [ 131.005977][ T7826] ? __ia32_sys_read+0x80/0x80 [ 131.010713][ T7826] ? fput_many+0x42/0x1a0 [ 131.015022][ T7826] do_syscall_64+0xcb/0x150 [ 131.019515][ T7826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.025381][ T7826] RIP: 0033:0x45de89 [ 131.029270][ T7826] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.048860][ T7826] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 131.057251][ T7826] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 131.065200][ T7826] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 131.073150][ T7826] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 131.081103][ T7826] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 131.089063][ T7826] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xc3ffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:50 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(0x0, 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xeaffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 131.099245][ T7831] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 131.116157][ T7829] EXT4-fs (loop2): unsupported descriptor size 0 01:04:50 executing program 0 (fault-call:11 fault-nth:13): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 131.205823][ T7848] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 131.216838][ T7849] EXT4-fs (loop2): unsupported descriptor size 0 [ 131.225822][ T7851] FAULT_INJECTION: forcing a failure. [ 131.225822][ T7851] name failslab, interval 1, probability 0, space 0, times 0 [ 131.239780][ T7851] CPU: 0 PID: 7851 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 131.249873][ T7851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.259915][ T7851] Call Trace: [ 131.263226][ T7851] dump_stack+0x1b0/0x21e [ 131.267562][ T7851] ? devkmsg_release+0x11c/0x11c [ 131.272486][ T7851] ? show_regs_print_info+0x12/0x12 [ 131.277665][ T7851] ? ext4_evict_inode+0x1a70/0x1a70 [ 131.282860][ T7851] ? _raw_spin_unlock+0x5/0x20 [ 131.287602][ T7851] ? __dquot_alloc_space+0x28b/0xcd0 [ 131.292883][ T7851] ? ext4_dio_get_block_unwritten_async+0x69/0x280 [ 131.299365][ T7851] should_fail+0x6fb/0x860 [ 131.303763][ T7851] ? setup_fault_attr+0x2b0/0x2b0 [ 131.308767][ T7851] ? __ext4_journal_start_sb+0x3ad/0x420 [ 131.314377][ T7851] ? __ext4_journal_stop+0x2f/0x190 [ 131.320511][ T7851] ? __ext4_expand_extra_isize+0x3b0/0x3b0 [ 131.326311][ T7851] ? ext4_mb_new_blocks+0x423/0x28a0 [ 131.331592][ T7851] should_failslab+0x5/0x20 [ 131.336082][ T7851] kmem_cache_alloc+0x36/0x250 [ 131.340828][ T7851] ext4_mb_new_blocks+0x423/0x28a0 [ 131.345923][ T7851] ? __kmalloc+0xf7/0x2c0 [ 131.350228][ T7851] ? kcalloc+0x2b/0x50 [ 131.354275][ T7851] ? mem_cgroup_try_charge_delay+0x10/0x10 [ 131.360061][ T7851] ? memset+0x1f/0x40 [ 131.364037][ T7851] ? ext4_mb_pa_callback+0xc0/0xc0 [ 131.369124][ T7851] ext4_ext_map_blocks+0x2d6d/0x4650 [ 131.375097][ T7851] ? ext4_ext_release+0x10/0x10 [ 131.379932][ T7851] ? _raw_spin_unlock+0x5/0x20 [ 131.384679][ T7851] ? follow_page_mask+0xdde/0x1050 [ 131.389781][ T7851] ? vmacache_update+0x9f/0xf0 [ 131.394542][ T7851] ? find_extend_vma+0xc3/0x2a0 [ 131.399379][ T7851] ? ext4_es_lookup_extent+0x415/0x900 [ 131.404819][ T7851] ext4_map_blocks+0x955/0x1e30 [ 131.409653][ T7851] ? ext4_issue_zeroout+0x160/0x160 [ 131.414833][ T7851] _ext4_get_block+0x214/0x6c0 [ 131.419581][ T7851] ? get_user_pages_fast+0x319/0x400 [ 131.424846][ T7851] ? ext4_get_block+0x40/0x40 [ 131.429503][ T7851] ? __ext4_journal_start_sb+0x3ad/0x420 [ 131.435112][ T7851] ext4_get_block_trans+0x414/0x5a0 [ 131.440291][ T7851] ? ext4_dio_get_block+0xb0/0xb0 [ 131.445300][ T7851] ? iov_iter_advance+0x1e9/0xef0 [ 131.450318][ T7851] ext4_dio_get_block_unwritten_async+0x69/0x280 [ 131.456624][ T7851] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 131.464071][ T7851] __blockdev_direct_IO+0x15ba/0x4910 [ 131.469439][ T7851] ? sb_init_dio_done_wq+0x80/0x80 [ 131.474545][ T7851] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 131.481036][ T7851] ? __mod_lruvec_state+0x51/0x3a0 [ 131.486125][ T7851] ? release_pages+0x9b4/0x9f0 [ 131.490867][ T7851] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 131.497343][ T7851] ext4_direct_IO+0x1591/0x20f0 [ 131.502175][ T7851] ? ext4_releasepage+0x280/0x280 [ 131.507177][ T7851] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 131.513328][ T7851] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 131.519043][ T7851] ? __writepage+0xc0/0xc0 [ 131.523440][ T7851] ? ext4_xattr_get+0x5a9/0x810 [ 131.528270][ T7851] ? filemap_check_errors+0xcf/0x110 [ 131.533536][ T7851] ? filemap_write_and_wait+0x430/0x430 [ 131.539086][ T7851] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 131.544786][ T7851] generic_file_direct_write+0x45b/0x6c0 [ 131.550398][ T7851] ? pagecache_write_end+0xa0/0xa0 [ 131.555487][ T7851] ? file_update_time+0x2cf/0x3d0 [ 131.560504][ T7851] ? file_remove_privs+0x600/0x600 [ 131.565594][ T7851] ? ext4_issue_zeroout+0x160/0x160 [ 131.570772][ T7851] __generic_file_write_iter+0x27a/0x460 [ 131.576383][ T7851] ext4_file_write_iter+0x9d0/0x1250 [ 131.581663][ T7851] ? ext4_file_read_iter+0x140/0x140 [ 131.586928][ T7851] ? avc_policy_seqno+0x17/0x70 [ 131.591758][ T7851] ? selinux_file_permission+0x2d0/0x520 [ 131.597384][ T7851] ? security_file_permission+0x128/0x300 [ 131.603112][ T7851] aio_write+0x45d/0x5f0 [ 131.607330][ T7851] ? aio_read+0x4a0/0x4a0 [ 131.611653][ T7851] ? __fget+0x37c/0x3c0 [ 131.615801][ T7851] ? setup_fault_attr+0x2b0/0x2b0 [ 131.620803][ T7851] ? fget_many+0x20/0x20 [ 131.625058][ T7851] ? io_submit_one+0x158/0x2370 [ 131.629899][ T7851] ? kmem_cache_alloc+0x1d5/0x250 [ 131.634900][ T7851] io_submit_one+0xa21/0x2370 [ 131.639569][ T7851] ? lookup_ioctx+0x460/0x460 [ 131.644239][ T7851] ? page_fault+0x2f/0x40 [ 131.648564][ T7851] ? __rcu_read_lock+0x50/0x50 [ 131.653306][ T7851] ? __se_sys_io_submit+0x90/0x380 [ 131.658400][ T7851] ? lookup_ioctx+0x26e/0x460 [ 131.663057][ T7851] ? security_file_permission+0x128/0x300 [ 131.668765][ T7851] __se_sys_io_submit+0x169/0x380 [ 131.673766][ T7851] ? fput_many+0x42/0x1a0 [ 131.679029][ T7851] ? __x64_sys_io_submit+0x80/0x80 [ 131.684120][ T7851] ? ksys_write+0x237/0x2a0 [ 131.688614][ T7851] ? __ia32_sys_read+0x80/0x80 [ 131.693366][ T7851] ? fput_many+0x42/0x1a0 [ 131.697673][ T7851] do_syscall_64+0xcb/0x150 [ 131.702161][ T7851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.708031][ T7851] RIP: 0033:0x45de89 [ 131.711907][ T7851] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.731488][ T7851] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 131.739875][ T7851] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 131.747841][ T7851] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 131.755806][ T7851] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 131.763754][ T7851] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 131.771702][ T7851] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:50 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xefffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:50 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:50 executing program 0 (fault-call:11 fault-nth:14): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 131.842705][ T7860] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 131.906124][ T7874] FAULT_INJECTION: forcing a failure. [ 131.906124][ T7874] name failslab, interval 1, probability 0, space 0, times 0 [ 131.919057][ T7874] CPU: 0 PID: 7874 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 131.929137][ T7874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.939180][ T7874] Call Trace: [ 131.942530][ T7874] dump_stack+0x1b0/0x21e [ 131.946882][ T7874] ? devkmsg_release+0x11c/0x11c [ 131.951805][ T7874] ? show_regs_print_info+0x12/0x12 [ 131.957000][ T7874] ? __es_remove_extent+0x14a1/0x2290 [ 131.962359][ T7874] should_fail+0x6fb/0x860 [ 131.966758][ T7874] ? setup_fault_attr+0x2b0/0x2b0 [ 131.971763][ T7874] ? __es_insert_extent+0x7a4/0x1770 [ 131.977027][ T7874] should_failslab+0x5/0x20 [ 131.981527][ T7874] kmem_cache_alloc+0x36/0x250 [ 131.986273][ T7874] __es_insert_extent+0x7a4/0x1770 [ 131.991373][ T7874] ext4_es_insert_extent+0x42b/0x2f40 [ 131.996736][ T7874] ? ext4_es_scan_clu+0x270/0x270 [ 132.002189][ T7874] ? percpu_counter_add_batch+0x12d/0x150 [ 132.007892][ T7874] ? _raw_read_unlock+0xe/0x30 [ 132.012638][ T7874] ? ext4_es_lookup_extent+0x415/0x900 [ 132.018115][ T7874] ext4_map_blocks+0xe27/0x1e30 [ 132.022955][ T7874] ? ext4_issue_zeroout+0x160/0x160 [ 132.028136][ T7874] _ext4_get_block+0x214/0x6c0 [ 132.032881][ T7874] ? get_user_pages_fast+0x319/0x400 [ 132.038149][ T7874] ? ext4_get_block+0x40/0x40 [ 132.042821][ T7874] ? __ext4_journal_start_sb+0x3ad/0x420 [ 132.048440][ T7874] ext4_get_block_trans+0x414/0x5a0 [ 132.053623][ T7874] ? ext4_dio_get_block+0xb0/0xb0 [ 132.058628][ T7874] ? iov_iter_advance+0x1e9/0xef0 [ 132.063634][ T7874] ext4_dio_get_block_unwritten_async+0x69/0x280 [ 132.069937][ T7874] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 132.076432][ T7874] __blockdev_direct_IO+0x15ba/0x4910 [ 132.081807][ T7874] ? sb_init_dio_done_wq+0x80/0x80 [ 132.086897][ T7874] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 132.093383][ T7874] ? __mod_lruvec_state+0x51/0x3a0 [ 132.098473][ T7874] ? release_pages+0x9b4/0x9f0 [ 132.103237][ T7874] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 132.109719][ T7874] ext4_direct_IO+0x1591/0x20f0 [ 132.114566][ T7874] ? ext4_releasepage+0x280/0x280 [ 132.119573][ T7874] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 132.125730][ T7874] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 132.131434][ T7874] ? __writepage+0xc0/0xc0 [ 132.135842][ T7874] ? ext4_xattr_get+0x5a9/0x810 [ 132.140689][ T7874] ? filemap_check_errors+0xcf/0x110 [ 132.145968][ T7874] ? filemap_write_and_wait+0x430/0x430 [ 132.151498][ T7874] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 132.157199][ T7874] generic_file_direct_write+0x45b/0x6c0 [ 132.162815][ T7874] ? pagecache_write_end+0xa0/0xa0 [ 132.167907][ T7874] ? file_update_time+0x2cf/0x3d0 [ 132.172909][ T7874] ? file_remove_privs+0x600/0x600 [ 132.178057][ T7874] ? ext4_issue_zeroout+0x160/0x160 [ 132.183256][ T7874] __generic_file_write_iter+0x27a/0x460 [ 132.188883][ T7874] ext4_file_write_iter+0x9d0/0x1250 [ 132.194148][ T7874] ? ext4_file_read_iter+0x140/0x140 [ 132.199426][ T7874] ? avc_policy_seqno+0x17/0x70 [ 132.204261][ T7874] ? selinux_file_permission+0x2d0/0x520 [ 132.209892][ T7874] ? security_file_permission+0x128/0x300 [ 132.215598][ T7874] aio_write+0x45d/0x5f0 [ 132.219822][ T7874] ? aio_read+0x4a0/0x4a0 [ 132.224157][ T7874] ? __fget+0x37c/0x3c0 [ 132.228303][ T7874] ? setup_fault_attr+0x2b0/0x2b0 [ 132.233308][ T7874] ? fget_many+0x20/0x20 [ 132.237532][ T7874] ? io_submit_one+0x158/0x2370 [ 132.242379][ T7874] ? kmem_cache_alloc+0x1d5/0x250 [ 132.247384][ T7874] io_submit_one+0xa21/0x2370 [ 132.252159][ T7874] ? lookup_ioctx+0x460/0x460 [ 132.256821][ T7874] ? page_fault+0x2f/0x40 [ 132.261136][ T7874] ? __rcu_read_lock+0x50/0x50 [ 132.265878][ T7874] ? __se_sys_io_submit+0x90/0x380 [ 132.270970][ T7874] ? lookup_ioctx+0x26e/0x460 [ 132.275644][ T7874] ? security_file_permission+0x128/0x300 [ 132.281342][ T7874] __se_sys_io_submit+0x169/0x380 [ 132.286346][ T7874] ? fput_many+0x42/0x1a0 [ 132.290679][ T7874] ? __x64_sys_io_submit+0x80/0x80 [ 132.295773][ T7874] ? ksys_write+0x237/0x2a0 [ 132.300253][ T7874] ? __ia32_sys_read+0x80/0x80 [ 132.304993][ T7874] ? fput_many+0x42/0x1a0 [ 132.309302][ T7874] do_syscall_64+0xcb/0x150 [ 132.313801][ T7874] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 132.319670][ T7874] RIP: 0033:0x45de89 [ 132.323544][ T7874] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.343150][ T7874] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 01:04:51 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfcffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 132.351568][ T7874] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 132.359522][ T7874] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 132.367503][ T7874] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 132.375467][ T7874] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 132.383426][ T7874] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 132.397374][ T7871] EXT4-fs (loop2): unsupported descriptor size 0 01:04:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfeffffff, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 132.409109][ T7879] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 132.507395][ T7894] EXT4-fs (loop2): unsupported descriptor size 0 01:04:51 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:51 executing program 0 (fault-call:11 fault-nth:15): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:51 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xffffff81, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 132.732956][ T7903] FAULT_INJECTION: forcing a failure. [ 132.732956][ T7903] name failslab, interval 1, probability 0, space 0, times 0 [ 132.747274][ T7902] EXT4-fs (loop2): unsupported descriptor size 0 [ 132.750734][ T7903] CPU: 1 PID: 7903 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 132.763658][ T7903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.773702][ T7903] Call Trace: 01:04:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 132.775818][ T7904] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 132.776984][ T7903] dump_stack+0x1b0/0x21e [ 132.777001][ T7903] ? devkmsg_release+0x11c/0x11c [ 132.792723][ T7903] ? show_regs_print_info+0x12/0x12 [ 132.797982][ T7903] ? ext4_get_block+0x40/0x40 [ 132.802763][ T7903] should_fail+0x6fb/0x860 [ 132.807151][ T7903] ? setup_fault_attr+0x2b0/0x2b0 [ 132.812147][ T7903] ? ext4_get_block_trans+0x487/0x5a0 [ 132.817489][ T7903] ? ext4_init_io_end+0x25/0xf0 [ 132.822326][ T7903] should_failslab+0x5/0x20 [ 132.827436][ T7903] kmem_cache_alloc+0x36/0x250 [ 132.832193][ T7903] ? iov_iter_advance+0x1e9/0xef0 [ 132.837190][ T7903] ext4_init_io_end+0x25/0xf0 [ 132.841960][ T7903] ext4_dio_get_block_unwritten_async+0x110/0x280 [ 132.848342][ T7903] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 132.854828][ T7903] __blockdev_direct_IO+0x15ba/0x4910 [ 132.860172][ T7903] ? sb_init_dio_done_wq+0x80/0x80 [ 132.865963][ T7903] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 132.872540][ T7903] ? __mod_lruvec_state+0x51/0x3a0 [ 132.877624][ T7903] ? release_pages+0x9b4/0x9f0 [ 132.882386][ T7903] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 132.888861][ T7903] ext4_direct_IO+0x1591/0x20f0 [ 132.893707][ T7903] ? ext4_releasepage+0x280/0x280 [ 132.898708][ T7903] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 132.904842][ T7903] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 132.911399][ T7903] ? __writepage+0xc0/0xc0 [ 132.915784][ T7903] ? ext4_xattr_get+0x5a9/0x810 [ 132.920604][ T7903] ? filemap_check_errors+0xcf/0x110 [ 132.925863][ T7903] ? filemap_write_and_wait+0x430/0x430 [ 132.931393][ T7903] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 132.937088][ T7903] generic_file_direct_write+0x45b/0x6c0 [ 132.942693][ T7903] ? pagecache_write_end+0xa0/0xa0 [ 132.947775][ T7903] ? file_update_time+0x2cf/0x3d0 [ 132.952776][ T7903] ? file_remove_privs+0x600/0x600 [ 132.957868][ T7903] ? ext4_issue_zeroout+0x160/0x160 [ 132.963036][ T7903] __generic_file_write_iter+0x27a/0x460 [ 132.968645][ T7903] ext4_file_write_iter+0x9d0/0x1250 [ 132.973922][ T7903] ? ext4_file_read_iter+0x140/0x140 [ 132.979263][ T7903] ? avc_policy_seqno+0x17/0x70 [ 132.984087][ T7903] ? selinux_file_permission+0x2d0/0x520 [ 132.989690][ T7903] ? security_file_permission+0x128/0x300 [ 132.995393][ T7903] aio_write+0x45d/0x5f0 [ 132.999604][ T7903] ? aio_read+0x4a0/0x4a0 [ 133.003903][ T7903] ? __fget+0x37c/0x3c0 [ 133.008030][ T7903] ? setup_fault_attr+0x2b0/0x2b0 [ 133.013022][ T7903] ? fget_many+0x20/0x20 [ 133.017245][ T7903] ? io_submit_one+0x158/0x2370 [ 133.022082][ T7903] ? kmem_cache_alloc+0x1d5/0x250 [ 133.027077][ T7903] io_submit_one+0xa21/0x2370 [ 133.031723][ T7903] ? lookup_ioctx+0x460/0x460 [ 133.036391][ T7903] ? page_fault+0x2f/0x40 [ 133.040720][ T7903] ? __rcu_read_lock+0x50/0x50 [ 133.045629][ T7903] ? __se_sys_io_submit+0x90/0x380 [ 133.050707][ T7903] ? lookup_ioctx+0x26e/0x460 [ 133.055393][ T7903] ? security_file_permission+0x128/0x300 [ 133.061110][ T7903] __se_sys_io_submit+0x169/0x380 [ 133.066113][ T7903] ? fput_many+0x42/0x1a0 [ 133.070429][ T7903] ? __x64_sys_io_submit+0x80/0x80 [ 133.075508][ T7903] ? ksys_write+0x237/0x2a0 [ 133.079996][ T7903] ? __ia32_sys_read+0x80/0x80 [ 133.084725][ T7903] ? fput_many+0x42/0x1a0 [ 133.089040][ T7903] do_syscall_64+0xcb/0x150 [ 133.093513][ T7903] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.099372][ T7903] RIP: 0033:0x45de89 [ 133.103250][ T7903] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.122824][ T7903] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 01:04:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 133.131200][ T7903] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 133.139146][ T7903] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 133.147112][ T7903] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 133.155070][ T7903] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 133.163012][ T7903] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:52 executing program 0 (fault-call:11 fault-nth:16): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:52 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 133.300080][ T7930] EXT4-fs (loop2): unsupported descriptor size 0 [ 133.309734][ T7932] FAULT_INJECTION: forcing a failure. [ 133.309734][ T7932] name failslab, interval 1, probability 0, space 0, times 0 [ 133.323812][ T7932] CPU: 0 PID: 7932 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 133.333862][ T7932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.343917][ T7932] Call Trace: [ 133.347228][ T7932] dump_stack+0x1b0/0x21e [ 133.351531][ T7932] ? devkmsg_release+0x11c/0x11c [ 133.356447][ T7932] ? show_regs_print_info+0x12/0x12 [ 133.361627][ T7932] ? __rcu_read_lock+0x50/0x50 [ 133.366367][ T7932] ? unwind_get_return_address_ptr+0x130/0x130 [ 133.372494][ T7932] should_fail+0x6fb/0x860 [ 133.376899][ T7932] ? setup_fault_attr+0x2b0/0x2b0 [ 133.381925][ T7932] ? stack_trace_save+0x1e0/0x1e0 [ 133.386969][ T7932] ? __kernel_text_address+0x93/0x110 [ 133.392464][ T7932] ? unwind_get_return_address+0x48/0x90 [ 133.398072][ T7932] ? mempool_alloc_slab+0x16/0x30 [ 133.403078][ T7932] ? mempool_free+0x380/0x380 [ 133.407724][ T7932] should_failslab+0x5/0x20 [ 133.412202][ T7932] kmem_cache_alloc+0x36/0x250 [ 133.416954][ T7932] ? mempool_free+0x380/0x380 [ 133.421622][ T7932] mempool_alloc_slab+0x16/0x30 [ 133.426470][ T7932] mempool_alloc+0x100/0x650 [ 133.431053][ T7932] ? ext4_data_block_valid+0x140/0x310 [ 133.436489][ T7932] ? mempool_resize+0x910/0x910 [ 133.441316][ T7932] ? ext4_issue_zeroout+0x160/0x160 [ 133.446504][ T7932] ? kmem_cache_alloc+0x1d5/0x250 [ 133.451525][ T7932] bio_alloc_bioset+0x1fc/0x660 [ 133.456346][ T7932] ? bio_chain_endio+0xf0/0xf0 [ 133.461079][ T7932] ? _ext4_get_block+0x47d/0x6c0 [ 133.465998][ T7932] dio_new_bio+0x517/0xa10 [ 133.470385][ T7932] ? __ext4_journal_start_sb+0x3ad/0x420 [ 133.475992][ T7932] dio_send_cur_page+0x47a/0xea0 [ 133.480918][ T7932] submit_page_section+0x100/0x970 [ 133.486013][ T7932] __blockdev_direct_IO+0x1f0a/0x4910 [ 133.491370][ T7932] ? sb_init_dio_done_wq+0x80/0x80 [ 133.496541][ T7932] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 133.503016][ T7932] ? __mod_lruvec_state+0x51/0x3a0 [ 133.508099][ T7932] ? release_pages+0x9b4/0x9f0 [ 133.512832][ T7932] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 133.519314][ T7932] ext4_direct_IO+0x1591/0x20f0 [ 133.524194][ T7932] ? ext4_releasepage+0x280/0x280 [ 133.529204][ T7932] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 133.535345][ T7932] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 133.541040][ T7932] ? __writepage+0xc0/0xc0 [ 133.545437][ T7932] ? ext4_xattr_get+0x5a9/0x810 [ 133.550303][ T7932] ? filemap_check_errors+0xcf/0x110 [ 133.555558][ T7932] ? filemap_write_and_wait+0x430/0x430 [ 133.561076][ T7932] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 133.566767][ T7932] generic_file_direct_write+0x45b/0x6c0 [ 133.572477][ T7932] ? pagecache_write_end+0xa0/0xa0 [ 133.577573][ T7932] ? file_update_time+0x2cf/0x3d0 [ 133.582584][ T7932] ? file_remove_privs+0x600/0x600 [ 133.587680][ T7932] ? ext4_issue_zeroout+0x160/0x160 [ 133.592853][ T7932] __generic_file_write_iter+0x27a/0x460 [ 133.598465][ T7932] ext4_file_write_iter+0x9d0/0x1250 [ 133.603724][ T7932] ? ext4_file_read_iter+0x140/0x140 [ 133.608979][ T7932] ? avc_policy_seqno+0x17/0x70 [ 133.613815][ T7932] ? selinux_file_permission+0x2d0/0x520 [ 133.619439][ T7932] ? security_file_permission+0x128/0x300 [ 133.625173][ T7932] aio_write+0x45d/0x5f0 [ 133.629388][ T7932] ? aio_read+0x4a0/0x4a0 [ 133.634136][ T7932] ? __fget+0x37c/0x3c0 [ 133.638265][ T7932] ? setup_fault_attr+0x2b0/0x2b0 [ 133.643258][ T7932] ? fget_many+0x20/0x20 [ 133.647476][ T7932] ? io_submit_one+0x158/0x2370 [ 133.652309][ T7932] ? kmem_cache_alloc+0x1d5/0x250 [ 133.657316][ T7932] io_submit_one+0xa21/0x2370 [ 133.661965][ T7932] ? lookup_ioctx+0x460/0x460 [ 133.666631][ T7932] ? page_fault+0x2f/0x40 [ 133.670944][ T7932] ? __rcu_read_lock+0x50/0x50 [ 133.675673][ T7932] ? __se_sys_io_submit+0x90/0x380 [ 133.680763][ T7932] ? lookup_ioctx+0x26e/0x460 [ 133.685409][ T7932] ? security_file_permission+0x128/0x300 [ 133.691136][ T7932] __se_sys_io_submit+0x169/0x380 [ 133.696130][ T7932] ? fput_many+0x42/0x1a0 [ 133.700437][ T7932] ? __x64_sys_io_submit+0x80/0x80 [ 133.705516][ T7932] ? ksys_write+0x237/0x2a0 [ 133.709989][ T7932] ? __ia32_sys_read+0x80/0x80 [ 133.714734][ T7932] ? fput_many+0x42/0x1a0 [ 133.719034][ T7932] do_syscall_64+0xcb/0x150 [ 133.723507][ T7932] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.729376][ T7932] RIP: 0033:0x45de89 01:04:52 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xffffffc3, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 133.733239][ T7932] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.752814][ T7932] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 133.761199][ T7932] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 133.769158][ T7932] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 133.777101][ T7932] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 133.785067][ T7932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 133.793023][ T7932] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xffffffea, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:52 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:52 executing program 0 (fault-call:11 fault-nth:17): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xffffffef, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 133.927888][ T7953] FAULT_INJECTION: forcing a failure. [ 133.927888][ T7953] name failslab, interval 1, probability 0, space 0, times 0 [ 133.949132][ T7953] CPU: 0 PID: 7953 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 133.959205][ T7953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.969277][ T7953] Call Trace: [ 133.972559][ T7953] dump_stack+0x1b0/0x21e [ 133.977571][ T7953] ? devkmsg_release+0x11c/0x11c [ 133.982478][ T7953] ? show_regs_print_info+0x12/0x12 [ 133.987651][ T7953] ? update_io_ticks+0x1aa/0x1c0 [ 133.992558][ T7953] ? blk_account_io_start+0x3ee/0x4a0 [ 133.997901][ T7953] should_fail+0x6fb/0x860 [ 134.002413][ T7953] ? setup_fault_attr+0x2b0/0x2b0 [ 134.007415][ T7953] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 134.012673][ T7953] ? mempool_alloc_slab+0x16/0x30 [ 134.017675][ T7953] ? mempool_free+0x380/0x380 [ 134.022337][ T7953] should_failslab+0x5/0x20 [ 134.026816][ T7953] kmem_cache_alloc+0x36/0x250 [ 134.031572][ T7953] ? mempool_free+0x380/0x380 [ 134.036224][ T7953] mempool_alloc_slab+0x16/0x30 [ 134.041067][ T7953] mempool_alloc+0x100/0x650 [ 134.045633][ T7953] ? generic_make_request+0xd43/0xde0 [ 134.050978][ T7953] ? mempool_resize+0x910/0x910 [ 134.055823][ T7953] ? blk_attempt_plug_merge+0x310/0x310 [ 134.061463][ T7953] ? bio_chain_endio+0xf0/0xf0 [ 134.066198][ T7953] ? _ext4_get_block+0x47d/0x6c0 [ 134.071118][ T7953] bio_alloc_bioset+0x1fc/0x660 [ 134.075954][ T7953] ? get_user_pages_fast+0x32d/0x400 [ 134.081214][ T7953] ? bio_chain_endio+0xf0/0xf0 [ 134.085947][ T7953] ? submit_bio+0x11f/0x520 [ 134.090435][ T7953] dio_new_bio+0x517/0xa10 [ 134.094826][ T7953] ? iov_iter_get_pages+0x727/0xea0 [ 134.100016][ T7953] dio_send_cur_page+0x47a/0xea0 [ 134.104928][ T7953] __blockdev_direct_IO+0x32b4/0x4910 [ 134.110636][ T7953] ? sb_init_dio_done_wq+0x80/0x80 [ 134.115717][ T7953] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 134.122195][ T7953] ? __mod_lruvec_state+0x51/0x3a0 [ 134.127314][ T7953] ? release_pages+0x9b4/0x9f0 [ 134.132072][ T7953] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 134.138547][ T7953] ext4_direct_IO+0x1591/0x20f0 [ 134.143373][ T7953] ? ext4_releasepage+0x280/0x280 [ 134.148400][ T7953] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 134.154526][ T7953] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 134.160215][ T7953] ? __writepage+0xc0/0xc0 [ 134.164701][ T7953] ? ext4_xattr_get+0x5a9/0x810 [ 134.169535][ T7953] ? filemap_check_errors+0xcf/0x110 [ 134.174791][ T7953] ? filemap_write_and_wait+0x430/0x430 [ 134.180323][ T7953] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 134.186016][ T7953] generic_file_direct_write+0x45b/0x6c0 [ 134.191624][ T7953] ? pagecache_write_end+0xa0/0xa0 [ 134.196718][ T7953] ? file_update_time+0x2cf/0x3d0 [ 134.201728][ T7953] ? file_remove_privs+0x600/0x600 [ 134.207081][ T7953] ? ext4_issue_zeroout+0x160/0x160 [ 134.212258][ T7953] __generic_file_write_iter+0x27a/0x460 [ 134.217875][ T7953] ext4_file_write_iter+0x9d0/0x1250 [ 134.223148][ T7953] ? ext4_file_read_iter+0x140/0x140 [ 134.228402][ T7953] ? avc_policy_seqno+0x17/0x70 [ 134.233224][ T7953] ? selinux_file_permission+0x2d0/0x520 [ 134.238837][ T7953] ? security_file_permission+0x128/0x300 [ 134.244547][ T7953] aio_write+0x45d/0x5f0 [ 134.248861][ T7953] ? aio_read+0x4a0/0x4a0 [ 134.253194][ T7953] ? __fget+0x37c/0x3c0 [ 134.257339][ T7953] ? setup_fault_attr+0x2b0/0x2b0 [ 134.262357][ T7953] ? fget_many+0x20/0x20 [ 134.266592][ T7953] ? io_submit_one+0x158/0x2370 [ 134.271430][ T7953] ? kmem_cache_alloc+0x1d5/0x250 [ 134.276438][ T7953] io_submit_one+0xa21/0x2370 [ 134.281091][ T7953] ? lookup_ioctx+0x460/0x460 [ 134.285756][ T7953] ? page_fault+0x2f/0x40 [ 134.290058][ T7953] ? __rcu_read_lock+0x50/0x50 [ 134.294796][ T7953] ? __se_sys_io_submit+0x90/0x380 [ 134.299887][ T7953] ? lookup_ioctx+0x26e/0x460 [ 134.304642][ T7953] ? security_file_permission+0x128/0x300 [ 134.310510][ T7953] __se_sys_io_submit+0x169/0x380 [ 134.315519][ T7953] ? fput_many+0x42/0x1a0 [ 134.319832][ T7953] ? __x64_sys_io_submit+0x80/0x80 [ 134.324933][ T7953] ? ksys_write+0x237/0x2a0 [ 134.329431][ T7953] ? __ia32_sys_read+0x80/0x80 [ 134.334170][ T7953] ? fput_many+0x42/0x1a0 [ 134.338486][ T7953] do_syscall_64+0xcb/0x150 [ 134.342986][ T7953] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 134.348865][ T7953] RIP: 0033:0x45de89 [ 134.352747][ T7953] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:04:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 134.372339][ T7953] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 134.380736][ T7953] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 134.388691][ T7953] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 134.396633][ T7953] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 134.404587][ T7953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 134.412533][ T7953] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:53 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 134.470101][ T7954] EXT4-fs (loop2): unsupported descriptor size 0 01:04:53 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:53 executing program 0 (fault-call:11 fault-nth:18): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(0x0, &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffe, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:53 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0xf, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 134.728003][ T7980] EXT4-fs (loop2): unsupported descriptor size 0 [ 134.735845][ T7978] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 134.755857][ T7986] FAULT_INJECTION: forcing a failure. [ 134.755857][ T7986] name failslab, interval 1, probability 0, space 0, times 0 [ 134.769249][ T7986] CPU: 1 PID: 7986 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 134.779308][ T7986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.789352][ T7986] Call Trace: [ 134.792616][ T7986] dump_stack+0x1b0/0x21e [ 134.796916][ T7986] ? devkmsg_release+0x11c/0x11c [ 134.801832][ T7986] ? show_regs_print_info+0x12/0x12 [ 134.807365][ T7986] should_fail+0x6fb/0x860 [ 134.812318][ T7986] ? setup_fault_attr+0x2b0/0x2b0 [ 134.817343][ T7986] ? ring_buffer_record_is_on+0x3d/0x60 [ 134.822874][ T7986] ? tracing_record_taskinfo+0xdc/0x260 [ 134.828393][ T7986] ? kcalloc+0x2b/0x50 [ 134.832447][ T7986] should_failslab+0x5/0x20 [ 134.836924][ T7986] __kmalloc+0x5f/0x2c0 [ 134.841049][ T7986] kcalloc+0x2b/0x50 [ 134.844942][ T7986] ext4_find_extent+0x2bb/0xce0 [ 134.849784][ T7986] ext4_ext_map_blocks+0x344/0x4650 [ 134.855042][ T7986] ? finish_task_switch+0x2be/0x4c0 [ 134.860210][ T7986] ? ext4_ext_release+0x10/0x10 [ 134.865031][ T7986] ? __schedule+0x8ae/0xe30 [ 134.869505][ T7986] ? down_write+0xd8/0x150 [ 134.873908][ T7986] ? down_read_killable+0x220/0x220 [ 134.879091][ T7986] ? ext4_es_lookup_extent+0x415/0x900 [ 134.884538][ T7986] ext4_map_blocks+0x955/0x1e30 [ 134.889468][ T7986] ? ext4_issue_zeroout+0x160/0x160 [ 134.894639][ T7986] ? newidle_balance+0x7a3/0x9a0 [ 134.899561][ T7986] ? __ext4_journal_start_sb+0x3ad/0x420 [ 134.905167][ T7986] ext4_convert_unwritten_extents+0x295/0x5a0 [ 134.911204][ T7986] ? ext4_alloc_file_blocks+0xca0/0xca0 [ 134.916747][ T7986] ? __schedule+0x8ae/0xe30 [ 134.921225][ T7986] ext4_put_io_end+0x14f/0x2e0 [ 134.925962][ T7986] ext4_end_io_dio+0x188/0x1e0 [ 134.930695][ T7986] ? ext4_dio_get_block_unwritten_async+0x280/0x280 [ 134.937255][ T7986] dio_complete+0x255/0x6d0 [ 134.941747][ T7986] __blockdev_direct_IO+0x40f1/0x4910 [ 134.947097][ T7986] ? sb_init_dio_done_wq+0x80/0x80 [ 134.952181][ T7986] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 134.958657][ T7986] ? __mod_lruvec_state+0x51/0x3a0 [ 134.963780][ T7986] ? release_pages+0x9b4/0x9f0 [ 134.968552][ T7986] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 134.975020][ T7986] ext4_direct_IO+0x1591/0x20f0 [ 134.979844][ T7986] ? ext4_releasepage+0x280/0x280 [ 134.984848][ T7986] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 134.990978][ T7986] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 134.996666][ T7986] ? __writepage+0xc0/0xc0 [ 135.001098][ T7986] ? ext4_xattr_get+0x5a9/0x810 [ 135.005920][ T7986] ? filemap_check_errors+0xcf/0x110 [ 135.011204][ T7986] ? filemap_write_and_wait+0x430/0x430 [ 135.016745][ T7986] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 135.022448][ T7986] generic_file_direct_write+0x45b/0x6c0 [ 135.028051][ T7986] ? pagecache_write_end+0xa0/0xa0 [ 135.033141][ T7986] ? file_update_time+0x2cf/0x3d0 [ 135.038132][ T7986] ? file_remove_privs+0x600/0x600 [ 135.043213][ T7986] ? ext4_issue_zeroout+0x160/0x160 [ 135.048380][ T7986] __generic_file_write_iter+0x27a/0x460 [ 135.053983][ T7986] ext4_file_write_iter+0x9d0/0x1250 [ 135.059236][ T7986] ? ext4_file_read_iter+0x140/0x140 [ 135.064501][ T7986] ? avc_policy_seqno+0x17/0x70 [ 135.069509][ T7986] ? selinux_file_permission+0x2d0/0x520 [ 135.075127][ T7986] ? security_file_permission+0x128/0x300 [ 135.080826][ T7986] aio_write+0x45d/0x5f0 [ 135.085037][ T7986] ? aio_read+0x4a0/0x4a0 [ 135.089349][ T7986] ? __fget+0x37c/0x3c0 [ 135.093488][ T7986] ? setup_fault_attr+0x2b0/0x2b0 [ 135.098496][ T7986] ? fget_many+0x20/0x20 [ 135.102707][ T7986] ? io_submit_one+0x158/0x2370 [ 135.107540][ T7986] ? kmem_cache_alloc+0x1d5/0x250 [ 135.112547][ T7986] io_submit_one+0xa21/0x2370 [ 135.117195][ T7986] ? lookup_ioctx+0x460/0x460 [ 135.121854][ T7986] ? page_fault+0x2f/0x40 [ 135.126153][ T7986] ? __rcu_read_lock+0x50/0x50 [ 135.130890][ T7986] ? __se_sys_io_submit+0x90/0x380 [ 135.135986][ T7986] ? lookup_ioctx+0x26e/0x460 [ 135.140633][ T7986] ? security_file_permission+0x128/0x300 [ 135.146330][ T7986] __se_sys_io_submit+0x169/0x380 [ 135.151335][ T7986] ? fput_many+0x42/0x1a0 [ 135.155632][ T7986] ? __x64_sys_io_submit+0x80/0x80 [ 135.160710][ T7986] ? ksys_write+0x237/0x2a0 [ 135.165195][ T7986] ? __ia32_sys_read+0x80/0x80 [ 135.169946][ T7986] ? fput_many+0x42/0x1a0 [ 135.174244][ T7986] do_syscall_64+0xcb/0x150 [ 135.178726][ T7986] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.184599][ T7986] RIP: 0033:0x45de89 [ 135.188463][ T7986] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.208056][ T7986] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 135.216454][ T7986] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 01:04:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(0x0, &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:54 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x10, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 135.224397][ T7986] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 135.232344][ T7986] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 135.240303][ T7986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 135.248258][ T7986] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 135.259067][ T7986] EXT4-fs warning (device sda1): ext4_convert_unwritten_extents:5012: inode #16663: block 0: len 1: ext4_ext_map_blocks returned -12 01:04:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:54 executing program 0 (fault-call:11 fault-nth:19): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 135.374850][ T8004] EXT4-fs (loop2): unsupported descriptor size 0 [ 135.399241][ T8010] FAULT_INJECTION: forcing a failure. [ 135.399241][ T8010] name failslab, interval 1, probability 0, space 0, times 0 [ 135.411905][ T8010] CPU: 0 PID: 8010 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 135.421974][ T8010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.432095][ T8010] Call Trace: [ 135.435363][ T8010] dump_stack+0x1b0/0x21e [ 135.439688][ T8010] ? devkmsg_release+0x11c/0x11c [ 135.444596][ T8010] ? show_regs_print_info+0x12/0x12 [ 135.449764][ T8010] ? __es_remove_extent+0x14a1/0x2290 [ 135.455125][ T8010] should_fail+0x6fb/0x860 [ 135.459517][ T8010] ? setup_fault_attr+0x2b0/0x2b0 [ 135.464534][ T8010] ? __es_insert_extent+0x7a4/0x1770 [ 135.469804][ T8010] should_failslab+0x5/0x20 [ 135.474288][ T8010] kmem_cache_alloc+0x36/0x250 [ 135.479034][ T8010] __es_insert_extent+0x7a4/0x1770 [ 135.484132][ T8010] ext4_es_insert_extent+0x42b/0x2f40 [ 135.489481][ T8010] ? ext4_es_scan_clu+0x270/0x270 [ 135.494487][ T8010] ? down_read_killable+0x220/0x220 [ 135.499666][ T8010] ? ext4_es_lookup_extent+0x415/0x900 [ 135.505142][ T8010] ext4_map_blocks+0xe27/0x1e30 [ 135.509980][ T8010] ? ext4_issue_zeroout+0x160/0x160 [ 135.515149][ T8010] ? newidle_balance+0x7a3/0x9a0 [ 135.520057][ T8010] ? __ext4_journal_start_sb+0x3ad/0x420 [ 135.525661][ T8010] ext4_convert_unwritten_extents+0x295/0x5a0 [ 135.531713][ T8010] ? ext4_alloc_file_blocks+0xca0/0xca0 [ 135.537271][ T8010] ? __schedule+0x8ae/0xe30 [ 135.541758][ T8010] ext4_put_io_end+0x14f/0x2e0 [ 135.546491][ T8010] ext4_end_io_dio+0x188/0x1e0 [ 135.551338][ T8010] ? ext4_dio_get_block_unwritten_async+0x280/0x280 [ 135.557905][ T8010] dio_complete+0x255/0x6d0 [ 135.562427][ T8010] __blockdev_direct_IO+0x40f1/0x4910 [ 135.567773][ T8010] ? sb_init_dio_done_wq+0x80/0x80 [ 135.572871][ T8010] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 135.579788][ T8010] ? __mod_lruvec_state+0x51/0x3a0 [ 135.584886][ T8010] ? release_pages+0x9b4/0x9f0 [ 135.589619][ T8010] ? ext4_dio_get_block_unwritten_sync+0x100/0x100 [ 135.596174][ T8010] ext4_direct_IO+0x1591/0x20f0 [ 135.601533][ T8010] ? ext4_releasepage+0x280/0x280 [ 135.606528][ T8010] ? invalidate_inode_pages2_range+0xc81/0xd50 [ 135.612652][ T8010] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 135.618339][ T8010] ? __writepage+0xc0/0xc0 [ 135.622753][ T8010] ? ext4_xattr_get+0x5a9/0x810 [ 135.627586][ T8010] ? filemap_check_errors+0xcf/0x110 [ 135.632861][ T8010] ? filemap_write_and_wait+0x430/0x430 [ 135.638640][ T8010] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 135.644330][ T8010] generic_file_direct_write+0x45b/0x6c0 [ 135.649934][ T8010] ? pagecache_write_end+0xa0/0xa0 [ 135.655056][ T8010] ? file_update_time+0x2cf/0x3d0 [ 135.660056][ T8010] ? file_remove_privs+0x600/0x600 [ 135.665141][ T8010] ? ext4_issue_zeroout+0x160/0x160 [ 135.670317][ T8010] __generic_file_write_iter+0x27a/0x460 [ 135.675933][ T8010] ext4_file_write_iter+0x9d0/0x1250 [ 135.681189][ T8010] ? ext4_file_read_iter+0x140/0x140 [ 135.686443][ T8010] ? avc_policy_seqno+0x17/0x70 [ 135.691287][ T8010] ? selinux_file_permission+0x2d0/0x520 [ 135.696890][ T8010] ? security_file_permission+0x128/0x300 [ 135.702610][ T8010] aio_write+0x45d/0x5f0 [ 135.706824][ T8010] ? aio_read+0x4a0/0x4a0 [ 135.711130][ T8010] ? __fget+0x37c/0x3c0 [ 135.715362][ T8010] ? setup_fault_attr+0x2b0/0x2b0 [ 135.720355][ T8010] ? fget_many+0x20/0x20 [ 135.724573][ T8010] ? io_submit_one+0x158/0x2370 [ 135.729402][ T8010] ? kmem_cache_alloc+0x1d5/0x250 [ 135.734399][ T8010] io_submit_one+0xa21/0x2370 [ 135.739063][ T8010] ? lookup_ioctx+0x460/0x460 [ 135.743708][ T8010] ? page_fault+0x2f/0x40 [ 135.748024][ T8010] ? __rcu_read_lock+0x50/0x50 [ 135.752755][ T8010] ? __se_sys_io_submit+0x90/0x380 [ 135.757835][ T8010] ? lookup_ioctx+0x26e/0x460 [ 135.762504][ T8010] ? security_file_permission+0x128/0x300 [ 135.768205][ T8010] __se_sys_io_submit+0x169/0x380 [ 135.773202][ T8010] ? fput_many+0x42/0x1a0 [ 135.777501][ T8010] ? __x64_sys_io_submit+0x80/0x80 [ 135.782581][ T8010] ? ksys_write+0x237/0x2a0 [ 135.787053][ T8010] ? __ia32_sys_read+0x80/0x80 [ 135.791796][ T8010] ? fput_many+0x42/0x1a0 [ 135.796096][ T8010] do_syscall_64+0xcb/0x150 [ 135.800582][ T8010] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.806443][ T8010] RIP: 0033:0x45de89 [ 135.810308][ T8010] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.829908][ T8010] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 135.838304][ T8010] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 135.846340][ T8010] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 135.854294][ T8010] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 135.862270][ T8010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 01:04:54 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0xc0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 135.870215][ T8010] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:55 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(0x0, &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0xec0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:55 executing program 0 (fault-call:11 fault-nth:20): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 135.931689][ T7999] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 135.949246][ T8017] EXT4-fs (loop2): unsupported descriptor size 0 01:04:55 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x33fe0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 136.061013][ T8032] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 136.089321][ T8037] FAULT_INJECTION: forcing a failure. [ 136.089321][ T8037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 136.103190][ T8037] CPU: 0 PID: 8037 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 136.113235][ T8037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.123319][ T8037] Call Trace: [ 136.126596][ T8037] dump_stack+0x1b0/0x21e [ 136.130908][ T8037] ? devkmsg_release+0x11c/0x11c [ 136.135827][ T8037] ? show_regs_print_info+0x12/0x12 [ 136.141019][ T8037] ? ext4_end_io_dio+0x188/0x1e0 [ 136.145936][ T8037] should_fail+0x6fb/0x860 [ 136.150335][ T8037] ? setup_fault_attr+0x2b0/0x2b0 [ 136.155341][ T8037] ? __blockdev_direct_IO+0x40f1/0x4910 [ 136.160872][ T8037] __alloc_pages_nodemask+0x1ee/0x7c0 [ 136.166225][ T8037] ? xas_load+0x468/0x4c0 [ 136.170533][ T8037] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 136.176061][ T8037] ? find_get_entry+0x5da/0x670 [ 136.180902][ T8037] ? xa_load+0x323/0x340 [ 136.185123][ T8037] __do_page_cache_readahead+0x244/0x510 [ 136.190739][ T8037] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 136.197145][ T8037] filemap_fault+0xac5/0x1990 [ 136.201814][ T8037] ? __down_read+0xf1/0x210 [ 136.206300][ T8037] ? generic_file_read_iter+0x20a0/0x20a0 [ 136.212021][ T8037] ext4_filemap_fault+0x7b/0x90 [ 136.216852][ T8037] handle_mm_fault+0x291e/0x4140 [ 136.221877][ T8037] ? finish_fault+0x230/0x230 [ 136.226538][ T8037] ? down_read_trylock+0x17a/0x1d0 [ 136.231632][ T8037] ? vmacache_find+0x205/0x4b0 [ 136.236374][ T8037] do_user_addr_fault+0x48a/0x9f0 [ 136.241378][ T8037] page_fault+0x2f/0x40 [ 136.245518][ T8037] RIP: 0010:iov_iter_fault_in_readable+0x1a8/0x5c0 [ 136.252004][ T8037] Code: 5c 24 10 48 63 c3 4e 8d 74 20 ff 4d 39 e6 0f 82 8b 01 00 00 4c 8d 6c 24 50 e8 e4 d1 4b ff 49 c1 ed 03 0f 1f 00 0f ae e8 31 db <45> 8a 3c 24 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 [ 136.271593][ T8037] RSP: 0018:ffff8881d1b375e0 EFLAGS: 00010246 [ 136.277641][ T8037] RAX: ffffffff81f595cc RBX: 0000000000000000 RCX: 0000000000040000 [ 136.285606][ T8037] RDX: ffffc90001dc8000 RSI: 000000000000148a RDI: 000000000000148b [ 136.293559][ T8037] RBP: ffff8881d1b37690 R08: ffffffff81f595a4 R09: fffff94000cf69c7 [ 136.301508][ T8037] R10: fffff94000cf69c7 R11: 0000000000000000 R12: 0000000020002000 [ 136.309478][ T8037] R13: 1ffff1103a366ec6 R14: 0000000020002fff R15: ffff8881d1b37a00 [ 136.317447][ T8037] ? iov_iter_fault_in_readable+0x174/0x5c0 [ 136.323329][ T8037] ? iov_iter_fault_in_readable+0x19c/0x5c0 [ 136.329211][ T8037] ? uuid_parse+0x3e0/0x3e0 [ 136.333694][ T8037] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 136.339394][ T8037] generic_perform_write+0x17a/0x530 [ 136.344665][ T8037] ? pagecache_write_end+0xa0/0xa0 [ 136.350017][ T8037] ? grab_cache_page_write_begin+0x90/0x90 [ 136.355801][ T8037] ? file_remove_privs+0x600/0x600 [ 136.360893][ T8037] ? ext4_issue_zeroout+0x160/0x160 [ 136.366076][ T8037] __generic_file_write_iter+0x319/0x460 [ 136.371956][ T8037] ext4_file_write_iter+0x9d0/0x1250 [ 136.377223][ T8037] ? ext4_file_read_iter+0x140/0x140 [ 136.382494][ T8037] ? avc_policy_seqno+0x17/0x70 [ 136.387339][ T8037] ? selinux_file_permission+0x2d0/0x520 [ 136.392966][ T8037] ? security_file_permission+0x128/0x300 [ 136.398672][ T8037] aio_write+0x45d/0x5f0 [ 136.402899][ T8037] ? aio_read+0x4a0/0x4a0 [ 136.407207][ T8037] ? __fget+0x37c/0x3c0 [ 136.411341][ T8037] ? setup_fault_attr+0x2b0/0x2b0 [ 136.416352][ T8037] ? fget_many+0x20/0x20 [ 136.420576][ T8037] ? io_submit_one+0x158/0x2370 [ 136.425413][ T8037] ? kmem_cache_alloc+0x1d5/0x250 [ 136.430433][ T8037] io_submit_one+0xa21/0x2370 [ 136.435115][ T8037] ? lookup_ioctx+0x460/0x460 [ 136.439780][ T8037] ? page_fault+0x2f/0x40 [ 136.444094][ T8037] ? __rcu_read_lock+0x50/0x50 [ 136.448835][ T8037] ? __se_sys_io_submit+0x90/0x380 [ 136.453930][ T8037] ? lookup_ioctx+0x26e/0x460 [ 136.458601][ T8037] ? security_file_permission+0x128/0x300 [ 136.464305][ T8037] __se_sys_io_submit+0x169/0x380 [ 136.469307][ T8037] ? fput_many+0x42/0x1a0 [ 136.473644][ T8037] ? __x64_sys_io_submit+0x80/0x80 [ 136.478735][ T8037] ? ksys_write+0x237/0x2a0 [ 136.483217][ T8037] ? __ia32_sys_read+0x80/0x80 [ 136.487957][ T8037] ? fput_many+0x42/0x1a0 [ 136.492272][ T8037] do_syscall_64+0xcb/0x150 [ 136.496763][ T8037] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.502643][ T8037] RIP: 0033:0x45de89 [ 136.506514][ T8037] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.526101][ T8037] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 136.534518][ T8037] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 136.542473][ T8037] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 136.550449][ T8037] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 136.563276][ T8037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 136.571229][ T8037] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 136.597242][ T8038] EXT4-fs (loop2): unsupported descriptor size 0 01:04:55 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 136.607318][ T8043] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:04:55 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x20000068, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:55 executing program 0 (fault-call:11 fault-nth:21): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:55 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x7ffff000, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 136.779352][ T8053] EXT4-fs (loop2): unsupported descriptor size 0 [ 136.789274][ T8054] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 136.800148][ T8065] FAULT_INJECTION: forcing a failure. [ 136.800148][ T8065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 136.815107][ T8065] CPU: 0 PID: 8065 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 136.825301][ T8065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.835364][ T8065] Call Trace: [ 136.838657][ T8065] dump_stack+0x1b0/0x21e [ 136.842970][ T8065] ? devkmsg_release+0x11c/0x11c [ 136.847892][ T8065] ? show_regs_print_info+0x12/0x12 [ 136.853327][ T8065] ? ext4_end_io_dio+0x188/0x1e0 [ 136.858244][ T8065] ? kasan_alloc_pages+0x4a/0x60 [ 136.863164][ T8065] should_fail+0x6fb/0x860 [ 136.867562][ T8065] ? setup_fault_attr+0x2b0/0x2b0 [ 136.872565][ T8065] __alloc_pages_nodemask+0x1ee/0x7c0 [ 136.877916][ T8065] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 136.883445][ T8065] ? find_get_entry+0x5da/0x670 [ 136.888300][ T8065] ? xa_load+0x323/0x340 [ 136.892521][ T8065] __do_page_cache_readahead+0x244/0x510 [ 136.898138][ T8065] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 136.904539][ T8065] filemap_fault+0xac5/0x1990 [ 136.909288][ T8065] ? __down_read+0xf1/0x210 [ 136.913774][ T8065] ? generic_file_read_iter+0x20a0/0x20a0 [ 136.919491][ T8065] ext4_filemap_fault+0x7b/0x90 [ 136.924337][ T8065] handle_mm_fault+0x291e/0x4140 [ 136.929255][ T8065] ? finish_fault+0x230/0x230 [ 136.933915][ T8065] ? down_read_trylock+0x17a/0x1d0 [ 136.939012][ T8065] ? vmacache_find+0x205/0x4b0 [ 136.943756][ T8065] do_user_addr_fault+0x48a/0x9f0 [ 136.948785][ T8065] page_fault+0x2f/0x40 [ 136.952922][ T8065] RIP: 0010:iov_iter_fault_in_readable+0x1a8/0x5c0 [ 136.959403][ T8065] Code: 5c 24 10 48 63 c3 4e 8d 74 20 ff 4d 39 e6 0f 82 8b 01 00 00 4c 8d 6c 24 50 e8 e4 d1 4b ff 49 c1 ed 03 0f 1f 00 0f ae e8 31 db <45> 8a 3c 24 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 [ 136.978987][ T8065] RSP: 0018:ffff8881d2a375e0 EFLAGS: 00010246 [ 136.985030][ T8065] RAX: ffffffff81f595cc RBX: 0000000000000000 RCX: 0000000000040000 [ 136.992982][ T8065] RDX: ffffc90001dc8000 RSI: 00000000000015f7 RDI: 00000000000015f8 [ 137.000936][ T8065] RBP: ffff8881d2a37690 R08: ffffffff81f595a4 R09: fffff94000e3ee47 [ 137.008890][ T8065] R10: fffff94000e3ee47 R11: 0000000000000000 R12: 0000000020002000 [ 137.016845][ T8065] R13: 1ffff1103a546ec6 R14: 0000000020002fff R15: ffff8881d2a37a00 [ 137.024810][ T8065] ? iov_iter_fault_in_readable+0x174/0x5c0 [ 137.030681][ T8065] ? iov_iter_fault_in_readable+0x19c/0x5c0 [ 137.036583][ T8065] ? uuid_parse+0x3e0/0x3e0 [ 137.041084][ T8065] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 137.047579][ T8065] generic_perform_write+0x17a/0x530 [ 137.052849][ T8065] ? pagecache_write_end+0xa0/0xa0 [ 137.057941][ T8065] ? grab_cache_page_write_begin+0x90/0x90 [ 137.063725][ T8065] ? file_remove_privs+0x600/0x600 [ 137.068816][ T8065] ? ext4_issue_zeroout+0x160/0x160 [ 137.074009][ T8065] __generic_file_write_iter+0x319/0x460 [ 137.079623][ T8065] ext4_file_write_iter+0x9d0/0x1250 [ 137.084889][ T8065] ? ext4_file_read_iter+0x140/0x140 [ 137.090160][ T8065] ? avc_policy_seqno+0x17/0x70 [ 137.094993][ T8065] ? selinux_file_permission+0x2d0/0x520 [ 137.100884][ T8065] ? security_file_permission+0x128/0x300 [ 137.106588][ T8065] aio_write+0x45d/0x5f0 [ 137.110812][ T8065] ? aio_read+0x4a0/0x4a0 [ 137.115122][ T8065] ? __fget+0x37c/0x3c0 [ 137.119261][ T8065] ? setup_fault_attr+0x2b0/0x2b0 [ 137.124277][ T8065] ? fget_many+0x20/0x20 [ 137.128503][ T8065] ? io_submit_one+0x158/0x2370 [ 137.133356][ T8065] ? kmem_cache_alloc+0x1d5/0x250 [ 137.138358][ T8065] io_submit_one+0xa21/0x2370 [ 137.143020][ T8065] ? lookup_ioctx+0x460/0x460 [ 137.147688][ T8065] ? page_fault+0x2f/0x40 [ 137.151997][ T8065] ? __rcu_read_lock+0x50/0x50 [ 137.156744][ T8065] ? __se_sys_io_submit+0x90/0x380 [ 137.161833][ T8065] ? lookup_ioctx+0x26e/0x460 [ 137.166490][ T8065] ? security_file_permission+0x128/0x300 [ 137.172202][ T8065] __se_sys_io_submit+0x169/0x380 [ 137.178191][ T8065] ? fput_many+0x42/0x1a0 [ 137.182504][ T8065] ? __x64_sys_io_submit+0x80/0x80 [ 137.187611][ T8065] ? ksys_write+0x237/0x2a0 [ 137.192094][ T8065] ? __ia32_sys_read+0x80/0x80 [ 137.196835][ T8065] ? fput_many+0x42/0x1a0 [ 137.201189][ T8065] do_syscall_64+0xcb/0x150 [ 137.205673][ T8065] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 137.211550][ T8065] RIP: 0033:0x45de89 [ 137.215430][ T8065] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.235020][ T8065] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 137.243419][ T8065] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 137.251405][ T8065] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 137.259369][ T8065] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 137.267327][ T8065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 01:04:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 137.275281][ T8065] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:56 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0xfffffdef, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x7, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 137.355641][ T8076] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 137.393512][ T8086] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 137.411471][ T8088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=8088 comm=syz-executor.5 [ 137.427899][ T8089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=8089 comm=syz-executor.5 01:04:56 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:56 executing program 0 (fault-call:11 fault-nth:22): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) 01:04:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:56 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x6b, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 137.664878][ T8097] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 137.671777][ T8099] FAULT_INJECTION: forcing a failure. [ 137.671777][ T8099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 137.684154][ T8102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=107 sclass=netlink_route_socket pid=8102 comm=syz-executor.5 [ 137.698931][ T8099] CPU: 1 PID: 8099 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 137.699870][ T8109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=107 sclass=netlink_route_socket pid=8109 comm=syz-executor.5 [ 137.709000][ T8099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.709003][ T8099] Call Trace: [ 137.709024][ T8099] dump_stack+0x1b0/0x21e [ 137.709034][ T8099] ? devkmsg_release+0x11c/0x11c [ 137.709044][ T8099] ? show_regs_print_info+0x12/0x12 [ 137.709060][ T8099] ? ext4_end_io_dio+0x188/0x1e0 [ 137.754881][ T8099] ? kasan_alloc_pages+0x4a/0x60 [ 137.759805][ T8099] should_fail+0x6fb/0x860 [ 137.764191][ T8099] ? setup_fault_attr+0x2b0/0x2b0 [ 137.769192][ T8099] __alloc_pages_nodemask+0x1ee/0x7c0 [ 137.774553][ T8099] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 137.780197][ T8099] ? find_get_entry+0x5da/0x670 [ 137.785054][ T8099] ? xa_load+0x323/0x340 [ 137.789294][ T8099] __do_page_cache_readahead+0x244/0x510 [ 137.794911][ T8099] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 137.801304][ T8099] filemap_fault+0xac5/0x1990 [ 137.805963][ T8099] ? __down_read+0xf1/0x210 [ 137.810477][ T8099] ? generic_file_read_iter+0x20a0/0x20a0 [ 137.816165][ T8099] ext4_filemap_fault+0x7b/0x90 [ 137.820997][ T8099] handle_mm_fault+0x291e/0x4140 [ 137.825905][ T8099] ? finish_fault+0x230/0x230 [ 137.830570][ T8099] ? down_read_trylock+0x17a/0x1d0 [ 137.835665][ T8099] ? vmacache_find+0x205/0x4b0 [ 137.840406][ T8099] do_user_addr_fault+0x48a/0x9f0 [ 137.845493][ T8099] page_fault+0x2f/0x40 [ 137.849634][ T8099] RIP: 0010:iov_iter_fault_in_readable+0x1a8/0x5c0 [ 137.856128][ T8099] Code: 5c 24 10 48 63 c3 4e 8d 74 20 ff 4d 39 e6 0f 82 8b 01 00 00 4c 8d 6c 24 50 e8 e4 d1 4b ff 49 c1 ed 03 0f 1f 00 0f ae e8 31 db <45> 8a 3c 24 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 [ 137.875717][ T8099] RSP: 0018:ffff88819e6bf5e0 EFLAGS: 00010246 [ 137.881760][ T8099] RAX: ffffffff81f595cc RBX: 0000000000000000 RCX: 0000000000040000 [ 137.889706][ T8099] RDX: ffffc90001dc8000 RSI: 00000000000014fa RDI: 00000000000014fb [ 137.897666][ T8099] RBP: ffff88819e6bf690 R08: ffffffff81f595a4 R09: fffff94000e85e67 [ 137.905610][ T8099] R10: fffff94000e85e67 R11: 0000000000000000 R12: 0000000020002000 [ 137.913555][ T8099] R13: 1ffff11033cd7ec6 R14: 0000000020002fff R15: ffff88819e6bfa00 [ 137.921518][ T8099] ? iov_iter_fault_in_readable+0x174/0x5c0 [ 137.927416][ T8099] ? iov_iter_fault_in_readable+0x19c/0x5c0 [ 137.933299][ T8099] ? uuid_parse+0x3e0/0x3e0 [ 137.937776][ T8099] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 137.943471][ T8099] generic_perform_write+0x17a/0x530 [ 137.948744][ T8099] ? pagecache_write_end+0xa0/0xa0 [ 137.953828][ T8099] ? grab_cache_page_write_begin+0x90/0x90 [ 137.959794][ T8099] ? file_remove_privs+0x600/0x600 [ 137.964889][ T8099] ? ext4_issue_zeroout+0x160/0x160 [ 137.970073][ T8099] __generic_file_write_iter+0x319/0x460 [ 137.975690][ T8099] ext4_file_write_iter+0x9d0/0x1250 [ 137.980952][ T8099] ? ext4_file_read_iter+0x140/0x140 [ 137.986229][ T8099] ? avc_policy_seqno+0x17/0x70 [ 137.991054][ T8099] ? selinux_file_permission+0x2d0/0x520 [ 137.996662][ T8099] ? security_file_permission+0x128/0x300 [ 138.002357][ T8099] aio_write+0x45d/0x5f0 [ 138.006589][ T8099] ? aio_read+0x4a0/0x4a0 [ 138.010914][ T8099] ? __fget+0x37c/0x3c0 [ 138.015491][ T8099] ? setup_fault_attr+0x2b0/0x2b0 [ 138.020486][ T8099] ? fget_many+0x20/0x20 [ 138.024699][ T8099] ? io_submit_one+0x158/0x2370 [ 138.029523][ T8099] ? kmem_cache_alloc+0x1d5/0x250 [ 138.034571][ T8099] io_submit_one+0xa21/0x2370 [ 138.039227][ T8099] ? lookup_ioctx+0x460/0x460 [ 138.043875][ T8099] ? page_fault+0x2f/0x40 [ 138.048188][ T8099] ? __rcu_read_lock+0x50/0x50 [ 138.052931][ T8099] ? __se_sys_io_submit+0x90/0x380 [ 138.058050][ T8099] ? lookup_ioctx+0x26e/0x460 [ 138.062698][ T8099] ? security_file_permission+0x128/0x300 [ 138.068390][ T8099] __se_sys_io_submit+0x169/0x380 [ 138.073403][ T8099] ? fput_many+0x42/0x1a0 [ 138.077722][ T8099] ? __x64_sys_io_submit+0x80/0x80 [ 138.082808][ T8099] ? ksys_write+0x237/0x2a0 [ 138.087280][ T8099] ? __ia32_sys_read+0x80/0x80 [ 138.092026][ T8099] ? fput_many+0x42/0x1a0 [ 138.096338][ T8099] do_syscall_64+0xcb/0x150 [ 138.100814][ T8099] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.106695][ T8099] RIP: 0033:0x45de89 [ 138.110560][ T8099] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.130168][ T8099] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 138.138588][ T8099] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 138.146540][ T8099] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 138.154495][ T8099] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 01:04:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0xe2c, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 138.162440][ T8099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 138.170397][ T8099] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 138.182378][ T8098] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:04:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) 01:04:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:57 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0xea0, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:57 executing program 0 (fault-call:11 fault-nth:23): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 138.207166][ T8114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3628 sclass=netlink_route_socket pid=8114 comm=syz-executor.5 [ 138.232728][ T8115] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3628 sclass=netlink_route_socket pid=8115 comm=syz-executor.5 [ 138.275610][ T8123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3744 sclass=netlink_route_socket pid=8123 comm=syz-executor.5 [ 138.282669][ T8121] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 138.290790][ T8125] FAULT_INJECTION: forcing a failure. [ 138.290790][ T8125] name failslab, interval 1, probability 0, space 0, times 0 [ 138.310812][ T8122] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 138.316892][ T8125] CPU: 0 PID: 8125 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 138.329679][ T8129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3744 sclass=netlink_route_socket pid=8129 comm=syz-executor.5 [ 138.330152][ T8125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.353245][ T8125] Call Trace: [ 138.356532][ T8125] dump_stack+0x1b0/0x21e [ 138.360833][ T8125] ? devkmsg_release+0x11c/0x11c [ 138.366440][ T8125] ? show_regs_print_info+0x12/0x12 [ 138.371610][ T8125] ? xas_create+0x1269/0x1360 [ 138.376258][ T8125] ? __rcu_read_lock+0x50/0x50 [ 138.381004][ T8125] should_fail+0x6fb/0x860 [ 138.385398][ T8125] ? setup_fault_attr+0x2b0/0x2b0 [ 138.390420][ T8125] ? mem_cgroup_commit_charge+0x16d/0x240 [ 138.396111][ T8125] ? _raw_spin_lock_irq+0xa2/0x180 [ 138.401209][ T8125] ? mem_cgroup_try_charge_delay+0x10/0x10 [ 138.406988][ T8125] ? mempool_alloc_slab+0x16/0x30 [ 138.412001][ T8125] ? mempool_free+0x380/0x380 [ 138.416680][ T8125] should_failslab+0x5/0x20 [ 138.421180][ T8125] kmem_cache_alloc+0x36/0x250 [ 138.425918][ T8125] ? xas_nomem+0x177/0x1b0 [ 138.430322][ T8125] ? mempool_free+0x380/0x380 [ 138.434985][ T8125] mempool_alloc_slab+0x16/0x30 [ 138.439810][ T8125] mempool_alloc+0x100/0x650 [ 138.444396][ T8125] ? percpu_counter_add_batch+0x12d/0x150 [ 138.450103][ T8125] ? _raw_read_unlock+0xe/0x30 [ 138.454838][ T8125] ? mempool_resize+0x910/0x910 [ 138.459675][ T8125] ? ext4_map_blocks+0x7e5/0x1e30 [ 138.464684][ T8125] ? __kasan_slab_free+0x168/0x220 [ 138.469783][ T8125] ? slab_free_freelist_hook+0xd0/0x150 [ 138.475302][ T8125] ? __lru_cache_add+0x1a1/0x1f0 [ 138.480211][ T8125] bio_alloc_bioset+0x1fc/0x660 [ 138.485035][ T8125] ? bio_chain_endio+0xf0/0xf0 [ 138.489773][ T8125] ? invalidate_mapping_pages+0x6d0/0x6d0 [ 138.495487][ T8125] ? __ext4_journal_stop+0x2f/0x190 [ 138.500661][ T8125] ext4_mpage_readpages+0xfa5/0x1eb0 [ 138.505939][ T8125] ? ext4_end_bio+0x590/0x590 [ 138.510587][ T8125] ? prep_new_page+0x11a/0x380 [ 138.515331][ T8125] ? ext4_readpages+0x8b/0x110 [ 138.520080][ T8125] ? ext4_journalled_set_page_dirty+0x30/0x30 [ 138.526115][ T8125] read_pages+0x108/0x3f0 [ 138.530420][ T8125] ? __do_page_cache_readahead+0x510/0x510 [ 138.536209][ T8125] ? find_get_entry+0x5da/0x670 [ 138.541048][ T8125] ? xa_load+0x323/0x340 [ 138.545267][ T8125] __do_page_cache_readahead+0x3e1/0x510 [ 138.550869][ T8125] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 138.557259][ T8125] filemap_fault+0xac5/0x1990 [ 138.561908][ T8125] ? __down_read+0xf1/0x210 [ 138.566392][ T8125] ? generic_file_read_iter+0x20a0/0x20a0 [ 138.572096][ T8125] ext4_filemap_fault+0x7b/0x90 [ 138.576934][ T8125] handle_mm_fault+0x291e/0x4140 [ 138.582389][ T8125] ? finish_fault+0x230/0x230 [ 138.587052][ T8125] ? down_read_trylock+0x17a/0x1d0 [ 138.592132][ T8125] ? vmacache_find+0x205/0x4b0 [ 138.596884][ T8125] do_user_addr_fault+0x48a/0x9f0 [ 138.601881][ T8125] page_fault+0x2f/0x40 [ 138.606010][ T8125] RIP: 0010:iov_iter_fault_in_readable+0x1a8/0x5c0 [ 138.612485][ T8125] Code: 5c 24 10 48 63 c3 4e 8d 74 20 ff 4d 39 e6 0f 82 8b 01 00 00 4c 8d 6c 24 50 e8 e4 d1 4b ff 49 c1 ed 03 0f 1f 00 0f ae e8 31 db <45> 8a 3c 24 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 [ 138.632071][ T8125] RSP: 0018:ffff8881ce2ff5e0 EFLAGS: 00010246 [ 138.638120][ T8125] RAX: ffffffff81f595cc RBX: 0000000000000000 RCX: 0000000000040000 [ 138.646077][ T8125] RDX: ffffc90001dc8000 RSI: 000000000000153a RDI: 000000000000153b [ 138.654472][ T8125] RBP: ffff8881ce2ff690 R08: ffffffff81f595a4 R09: fffff94000cf637f [ 138.662416][ T8125] R10: fffff94000cf637f R11: 0000000000000000 R12: 0000000020002000 [ 138.670369][ T8125] R13: 1ffff11039c5fec6 R14: 0000000020002fff R15: ffff8881ce2ffa00 [ 138.678320][ T8125] ? iov_iter_fault_in_readable+0x174/0x5c0 [ 138.684207][ T8125] ? iov_iter_fault_in_readable+0x19c/0x5c0 [ 138.690130][ T8125] ? uuid_parse+0x3e0/0x3e0 [ 138.695565][ T8125] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 138.701294][ T8125] generic_perform_write+0x17a/0x530 [ 138.706578][ T8125] ? pagecache_write_end+0xa0/0xa0 [ 138.711670][ T8125] ? grab_cache_page_write_begin+0x90/0x90 [ 138.717466][ T8125] ? file_remove_privs+0x600/0x600 [ 138.722557][ T8125] ? ext4_issue_zeroout+0x160/0x160 [ 138.727749][ T8125] __generic_file_write_iter+0x319/0x460 [ 138.733353][ T8125] ext4_file_write_iter+0x9d0/0x1250 [ 138.738610][ T8125] ? ext4_file_read_iter+0x140/0x140 [ 138.743864][ T8125] ? avc_policy_seqno+0x17/0x70 [ 138.748684][ T8125] ? selinux_file_permission+0x2d0/0x520 [ 138.754296][ T8125] ? security_file_permission+0x128/0x300 [ 138.759986][ T8125] aio_write+0x45d/0x5f0 [ 138.764212][ T8125] ? aio_read+0x4a0/0x4a0 [ 138.768512][ T8125] ? __fget+0x37c/0x3c0 [ 138.772660][ T8125] ? setup_fault_attr+0x2b0/0x2b0 [ 138.777663][ T8125] ? fget_many+0x20/0x20 [ 138.781893][ T8125] ? io_submit_one+0x158/0x2370 [ 138.786749][ T8125] ? kmem_cache_alloc+0x1d5/0x250 [ 138.791763][ T8125] io_submit_one+0xa21/0x2370 [ 138.796445][ T8125] ? lookup_ioctx+0x460/0x460 [ 138.801102][ T8125] ? page_fault+0x2f/0x40 [ 138.805415][ T8125] ? __rcu_read_lock+0x50/0x50 [ 138.810177][ T8125] ? __se_sys_io_submit+0x90/0x380 [ 138.815330][ T8125] ? lookup_ioctx+0x26e/0x460 [ 138.819982][ T8125] ? security_file_permission+0x128/0x300 [ 138.825672][ T8125] __se_sys_io_submit+0x169/0x380 [ 138.830666][ T8125] ? fput_many+0x42/0x1a0 [ 138.834989][ T8125] ? __x64_sys_io_submit+0x80/0x80 [ 138.840084][ T8125] ? ksys_write+0x237/0x2a0 [ 138.844559][ T8125] ? __ia32_sys_read+0x80/0x80 [ 138.849378][ T8125] ? fput_many+0x42/0x1a0 [ 138.853676][ T8125] do_syscall_64+0xcb/0x150 [ 138.858499][ T8125] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.864360][ T8125] RIP: 0033:0x45de89 [ 138.868224][ T8125] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.888434][ T8125] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 138.896861][ T8125] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 138.904822][ T8125] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 138.912763][ T8125] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 138.920705][ T8125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 01:04:58 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x802, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 138.928665][ T8125] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:04:58 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) 01:04:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x803, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:58 executing program 0 (fault-call:11 fault-nth:24): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:58 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 139.050806][ T8137] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 139.073209][ T8146] FAULT_INJECTION: forcing a failure. [ 139.073209][ T8146] name failslab, interval 1, probability 0, space 0, times 0 [ 139.088254][ T8146] CPU: 1 PID: 8146 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 139.089757][ T8144] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 139.098310][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.098314][ T8146] Call Trace: [ 139.098333][ T8146] dump_stack+0x1b0/0x21e [ 139.098345][ T8146] ? devkmsg_release+0x11c/0x11c [ 139.098355][ T8146] ? show_regs_print_info+0x12/0x12 [ 139.098366][ T8146] ? blk_attempt_plug_merge+0x310/0x310 [ 139.098378][ T8146] should_fail+0x6fb/0x860 [ 139.098394][ T8146] ? setup_fault_attr+0x2b0/0x2b0 [ 139.149928][ T8146] ? submit_bio+0x11f/0x520 [ 139.154419][ T8146] ? mempool_alloc_slab+0x16/0x30 [ 139.159414][ T8146] ? mempool_free+0x380/0x380 [ 139.164073][ T8146] should_failslab+0x5/0x20 [ 139.168557][ T8146] kmem_cache_alloc+0x36/0x250 [ 139.173322][ T8146] ? xas_nomem+0x177/0x1b0 [ 139.177755][ T8146] ? mempool_free+0x380/0x380 [ 139.183105][ T8146] mempool_alloc_slab+0x16/0x30 [ 139.187957][ T8146] mempool_alloc+0x100/0x650 [ 139.192538][ T8146] ? percpu_counter_add_batch+0x12d/0x150 [ 139.198234][ T8146] ? _raw_read_unlock+0xe/0x30 [ 139.203020][ T8146] ? mempool_resize+0x910/0x910 [ 139.207860][ T8146] ? ext4_map_blocks+0x7e5/0x1e30 [ 139.212917][ T8146] ? __kasan_slab_free+0x168/0x220 [ 139.218051][ T8146] ? slab_free_freelist_hook+0xd0/0x150 [ 139.223588][ T8146] ? __lru_cache_add+0x1a1/0x1f0 [ 139.228499][ T8146] bio_alloc_bioset+0x1fc/0x660 [ 139.233320][ T8146] ? bio_chain_endio+0xf0/0xf0 [ 139.238052][ T8146] ? bio_add_page+0x2ea/0x470 [ 139.242702][ T8146] ? __ext4_journal_stop+0x2f/0x190 [ 139.247872][ T8146] ext4_mpage_readpages+0xfa5/0x1eb0 [ 139.253127][ T8146] ? ext4_end_bio+0x590/0x590 [ 139.257772][ T8146] ? prep_new_page+0x11a/0x380 [ 139.262514][ T8146] ? ext4_readpages+0x8b/0x110 [ 139.267255][ T8146] ? ext4_journalled_set_page_dirty+0x30/0x30 [ 139.273673][ T8146] read_pages+0x108/0x3f0 [ 139.277989][ T8146] ? __do_page_cache_readahead+0x510/0x510 [ 139.283783][ T8146] ? find_get_entry+0x5da/0x670 [ 139.288621][ T8146] ? xa_load+0x323/0x340 [ 139.292832][ T8146] __do_page_cache_readahead+0x3e1/0x510 [ 139.298433][ T8146] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 139.304832][ T8146] filemap_fault+0xac5/0x1990 [ 139.309496][ T8146] ? __down_read+0xf1/0x210 [ 139.313978][ T8146] ? generic_file_read_iter+0x20a0/0x20a0 [ 139.319692][ T8146] ext4_filemap_fault+0x7b/0x90 [ 139.324528][ T8146] handle_mm_fault+0x291e/0x4140 [ 139.329436][ T8146] ? finish_fault+0x230/0x230 [ 139.334083][ T8146] ? down_read_trylock+0x17a/0x1d0 [ 139.339268][ T8146] ? vmacache_find+0x205/0x4b0 [ 139.344002][ T8146] do_user_addr_fault+0x48a/0x9f0 [ 139.349006][ T8146] page_fault+0x2f/0x40 [ 139.353142][ T8146] RIP: 0010:iov_iter_fault_in_readable+0x1a8/0x5c0 [ 139.359611][ T8146] Code: 5c 24 10 48 63 c3 4e 8d 74 20 ff 4d 39 e6 0f 82 8b 01 00 00 4c 8d 6c 24 50 e8 e4 d1 4b ff 49 c1 ed 03 0f 1f 00 0f ae e8 31 db <45> 8a 3c 24 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 [ 139.379182][ T8146] RSP: 0018:ffff8881a480f5e0 EFLAGS: 00010246 [ 139.385223][ T8146] RAX: ffffffff81f595cc RBX: 0000000000000000 RCX: 0000000000040000 [ 139.393173][ T8146] RDX: ffffc90001dc8000 RSI: 0000000000001573 RDI: 0000000000001574 [ 139.401118][ T8146] RBP: ffff8881a480f690 R08: ffffffff81f595a4 R09: fffff94000cc8c1f [ 139.409063][ T8146] R10: fffff94000cc8c1f R11: 0000000000000000 R12: 0000000020002000 [ 139.417006][ T8146] R13: 1ffff11034901ec6 R14: 0000000020002fff R15: ffff8881a480fa00 [ 139.424958][ T8146] ? iov_iter_fault_in_readable+0x174/0x5c0 [ 139.430934][ T8146] ? iov_iter_fault_in_readable+0x19c/0x5c0 [ 139.436818][ T8146] ? uuid_parse+0x3e0/0x3e0 [ 139.441292][ T8146] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 139.447001][ T8146] generic_perform_write+0x17a/0x530 [ 139.452257][ T8146] ? pagecache_write_end+0xa0/0xa0 [ 139.457337][ T8146] ? grab_cache_page_write_begin+0x90/0x90 [ 139.463115][ T8146] ? file_remove_privs+0x600/0x600 [ 139.468219][ T8146] ? ext4_issue_zeroout+0x160/0x160 [ 139.473395][ T8146] __generic_file_write_iter+0x319/0x460 [ 139.479006][ T8146] ext4_file_write_iter+0x9d0/0x1250 [ 139.484259][ T8146] ? ext4_file_read_iter+0x140/0x140 [ 139.489513][ T8146] ? avc_policy_seqno+0x17/0x70 [ 139.494333][ T8146] ? selinux_file_permission+0x2d0/0x520 [ 139.499934][ T8146] ? security_file_permission+0x128/0x300 [ 139.505661][ T8146] aio_write+0x45d/0x5f0 [ 139.509902][ T8146] ? aio_read+0x4a0/0x4a0 [ 139.514201][ T8146] ? __fget+0x37c/0x3c0 [ 139.518326][ T8146] ? setup_fault_attr+0x2b0/0x2b0 [ 139.523317][ T8146] ? fget_many+0x20/0x20 [ 139.527527][ T8146] ? io_submit_one+0x158/0x2370 [ 139.532356][ T8146] ? kmem_cache_alloc+0x1d5/0x250 [ 139.537357][ T8146] io_submit_one+0xa21/0x2370 [ 139.542004][ T8146] ? lookup_ioctx+0x460/0x460 [ 139.546663][ T8146] ? page_fault+0x2f/0x40 [ 139.550981][ T8146] ? __rcu_read_lock+0x50/0x50 [ 139.555724][ T8146] ? __se_sys_io_submit+0x90/0x380 [ 139.560893][ T8146] ? lookup_ioctx+0x26e/0x460 [ 139.565561][ T8146] ? security_file_permission+0x128/0x300 [ 139.571261][ T8146] __se_sys_io_submit+0x169/0x380 [ 139.576257][ T8146] ? fput_many+0x42/0x1a0 [ 139.580558][ T8146] ? __x64_sys_io_submit+0x80/0x80 [ 139.585637][ T8146] ? ksys_write+0x237/0x2a0 [ 139.590116][ T8146] ? __ia32_sys_read+0x80/0x80 [ 139.594862][ T8146] ? fput_many+0x42/0x1a0 [ 139.599170][ T8146] do_syscall_64+0xcb/0x150 [ 139.603665][ T8146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.609591][ T8146] RIP: 0033:0x45de89 [ 139.613464][ T8146] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.633840][ T8146] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 139.642230][ T8146] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 01:04:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x808, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(0x0, &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x81c, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 139.650182][ T8146] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 139.658122][ T8146] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 139.666063][ T8146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 139.674017][ T8146] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 139.756101][ T8164] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 139.763617][ T8163] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:04:58 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:04:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:58 executing program 0 (fault-call:11 fault-nth:25): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:58 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:04:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(0x0, &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:04:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:04:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x3, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:04:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 139.890290][ T8183] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 139.893926][ T8179] FAULT_INJECTION: forcing a failure. [ 139.893926][ T8179] name failslab, interval 1, probability 0, space 0, times 0 [ 139.909738][ T8179] CPU: 1 PID: 8179 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 139.919811][ T8179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.929853][ T8179] Call Trace: [ 139.933137][ T8179] dump_stack+0x1b0/0x21e [ 139.937465][ T8179] ? devkmsg_release+0x11c/0x11c [ 139.942397][ T8179] ? arch_stack_walk+0x98/0xe0 [ 139.947162][ T8179] ? show_regs_print_info+0x12/0x12 [ 139.952346][ T8179] ? __es_remove_extent+0xe94/0x2290 [ 139.957618][ T8179] should_fail+0x6fb/0x860 [ 139.962020][ T8179] ? setup_fault_attr+0x2b0/0x2b0 [ 139.967024][ T8179] ? __es_insert_extent+0x7a4/0x1770 [ 139.972292][ T8179] should_failslab+0x5/0x20 [ 139.976790][ T8179] kmem_cache_alloc+0x36/0x250 [ 139.981539][ T8179] ? _raw_spin_trylock_bh+0x190/0x190 [ 139.986894][ T8179] __es_insert_extent+0x7a4/0x1770 [ 139.992006][ T8179] ? do_syscall_64+0xcb/0x150 [ 139.996664][ T8179] ext4_es_insert_delayed_block+0x2bd/0x690 [ 140.002539][ T8179] ? ext4_is_pending+0x1f0/0x1f0 [ 140.007455][ T8179] ? percpu_counter_add_batch+0x12d/0x150 [ 140.013153][ T8179] ? ext4_claim_free_clusters+0x66/0xa0 [ 140.018677][ T8179] ? ext4_da_reserve_space+0x2e0/0x3a0 [ 140.024118][ T8179] ext4_da_get_block_prep+0x67e/0x12f0 [ 140.029556][ T8179] ? __should_failslab+0x92/0x150 [ 140.034561][ T8179] ? ext4_da_release_space+0x430/0x430 [ 140.039997][ T8179] ? _raw_spin_lock+0xa1/0x170 [ 140.044753][ T8179] ? _raw_spin_trylock_bh+0x190/0x190 [ 140.050102][ T8179] ? alloc_page_buffers+0x332/0x3e0 [ 140.055282][ T8179] ? create_empty_buffers+0x46b/0x4e0 [ 140.060643][ T8179] ext4_block_write_begin+0x6db/0x1230 [ 140.066108][ T8179] ? ext4_da_release_space+0x430/0x430 [ 140.071543][ T8179] ? mpage_map_one_extent+0x960/0x960 [ 140.076893][ T8179] ? __ext4_journal_start_sb+0x3ad/0x420 [ 140.082511][ T8179] ext4_da_write_begin+0xbdb/0xfb0 [ 140.087599][ T8179] ? ext4_set_page_dirty+0x190/0x190 [ 140.092862][ T8179] ? page_fault+0x2f/0x40 [ 140.097170][ T8179] ? iov_iter_fault_in_readable+0x174/0x5c0 [ 140.103039][ T8179] ? iov_iter_fault_in_readable+0x19c/0x5c0 [ 140.108910][ T8179] ? iov_iter_fault_in_readable+0x1a8/0x5c0 [ 140.114779][ T8179] ? iov_iter_fault_in_readable+0x2bd/0x5c0 [ 140.120650][ T8179] ? uuid_parse+0x3e0/0x3e0 [ 140.125131][ T8179] ? __ext4_journal_start_sb+0x400/0x420 [ 140.130749][ T8179] generic_perform_write+0x271/0x530 [ 140.136015][ T8179] ? grab_cache_page_write_begin+0x90/0x90 [ 140.141801][ T8179] ? file_remove_privs+0x600/0x600 [ 140.146889][ T8179] ? ext4_issue_zeroout+0x160/0x160 [ 140.152065][ T8179] __generic_file_write_iter+0x319/0x460 [ 140.157674][ T8179] ext4_file_write_iter+0x9d0/0x1250 [ 140.162938][ T8179] ? ext4_file_read_iter+0x140/0x140 [ 140.168198][ T8179] ? avc_policy_seqno+0x17/0x70 [ 140.173028][ T8179] ? selinux_file_permission+0x2d0/0x520 [ 140.178645][ T8179] ? security_file_permission+0x128/0x300 [ 140.184340][ T8179] aio_write+0x45d/0x5f0 [ 140.188568][ T8179] ? aio_read+0x4a0/0x4a0 [ 140.192881][ T8179] ? __fget+0x37c/0x3c0 [ 140.197015][ T8179] ? setup_fault_attr+0x2b0/0x2b0 [ 140.202017][ T8179] ? fget_many+0x20/0x20 [ 140.206251][ T8179] ? io_submit_one+0x158/0x2370 [ 140.211093][ T8179] ? kmem_cache_alloc+0x1d5/0x250 [ 140.216464][ T8179] io_submit_one+0xa21/0x2370 [ 140.221121][ T8179] ? lookup_ioctx+0x460/0x460 [ 140.225774][ T8179] ? page_fault+0x2f/0x40 [ 140.230091][ T8179] ? __rcu_read_lock+0x50/0x50 [ 140.234847][ T8179] ? __se_sys_io_submit+0x90/0x380 [ 140.239935][ T8179] ? lookup_ioctx+0x26e/0x460 [ 140.244594][ T8179] ? security_file_permission+0x128/0x300 [ 140.250288][ T8179] __se_sys_io_submit+0x169/0x380 [ 140.255331][ T8179] ? fput_many+0x42/0x1a0 [ 140.259648][ T8179] ? __x64_sys_io_submit+0x80/0x80 [ 140.264739][ T8179] ? ksys_write+0x237/0x2a0 [ 140.269220][ T8179] ? __ia32_sys_read+0x80/0x80 [ 140.274397][ T8179] ? fput_many+0x42/0x1a0 [ 140.278707][ T8179] do_syscall_64+0xcb/0x150 [ 140.283201][ T8179] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 140.289852][ T8179] RIP: 0033:0x45de89 [ 140.293724][ T8179] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.313312][ T8179] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 140.321705][ T8179] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 140.329652][ T8179] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 01:04:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x4, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 140.337983][ T8179] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 140.345933][ T8179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 140.353882][ T8179] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 140.382012][ T8180] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:04:59 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, 0x0) [ 140.405935][ T8197] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:04:59 executing program 0 (fault-call:11 fault-nth:26): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 140.491887][ T8207] FAULT_INJECTION: forcing a failure. [ 140.491887][ T8207] name failslab, interval 1, probability 0, space 0, times 0 [ 140.504596][ T8207] CPU: 0 PID: 8207 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 140.514635][ T8207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.524668][ T8207] Call Trace: [ 140.527973][ T8207] dump_stack+0x1b0/0x21e [ 140.532311][ T8207] ? devkmsg_release+0x11c/0x11c [ 140.537249][ T8207] ? xas_find_marked+0x8ec/0xa10 [ 140.542158][ T8207] ? show_regs_print_info+0x12/0x12 [ 140.547334][ T8207] ? xas_set_mark+0x18e/0x1e0 [ 140.552049][ T8207] should_fail+0x6fb/0x860 [ 140.556458][ T8207] ? setup_fault_attr+0x2b0/0x2b0 [ 140.561460][ T8207] ? page_writeback_cpu_online+0x2f0/0x2f0 [ 140.567273][ T8207] ? ext4_da_get_block_prep+0xcff/0x12f0 [ 140.572877][ T8207] ? ext4_init_io_end+0x25/0xf0 [ 140.577697][ T8207] should_failslab+0x5/0x20 [ 140.582264][ T8207] kmem_cache_alloc+0x36/0x250 [ 140.587024][ T8207] ext4_init_io_end+0x25/0xf0 [ 140.591686][ T8207] ext4_writepages+0x140d/0x3d10 [ 140.596594][ T8207] ? __rcu_read_lock+0x50/0x50 [ 140.601341][ T8207] ? account_page_dirtied+0x430/0x570 [ 140.606695][ T8207] ? ext4_readpage+0x2b0/0x2b0 [ 140.611441][ T8207] ? __ext4_journal_start_sb+0x3ad/0x420 [ 140.617068][ T8207] ? ext4_da_write_begin+0xe84/0xfb0 [ 140.622338][ T8207] ? mark_buffer_dirty+0x334/0x380 [ 140.627417][ T8207] ? __block_commit_write+0x226/0x240 [ 140.632771][ T8207] ? ext4_readpage+0x2b0/0x2b0 [ 140.637513][ T8207] do_writepages+0x12e/0x290 [ 140.642076][ T8207] ? __writepage+0xc0/0xc0 [ 140.646462][ T8207] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 140.652768][ T8207] ? ext4_da_write_begin+0xfb0/0xfb0 [ 140.658050][ T8207] ? generic_perform_write+0x48d/0x530 [ 140.663488][ T8207] filemap_write_and_wait_range+0x3b8/0x470 [ 140.669349][ T8207] ? filemap_write_and_wait+0x430/0x430 [ 140.674874][ T8207] ? file_remove_privs+0x600/0x600 [ 140.679954][ T8207] ? ext4_issue_zeroout+0x160/0x160 [ 140.685132][ T8207] __generic_file_write_iter+0x345/0x460 [ 140.690735][ T8207] ext4_file_write_iter+0x9d0/0x1250 [ 140.696005][ T8207] ? ext4_file_read_iter+0x140/0x140 [ 140.701267][ T8207] ? avc_policy_seqno+0x17/0x70 [ 140.706089][ T8207] ? selinux_file_permission+0x2d0/0x520 [ 140.711707][ T8207] ? security_file_permission+0x128/0x300 [ 140.717404][ T8207] aio_write+0x45d/0x5f0 [ 140.721619][ T8207] ? aio_read+0x4a0/0x4a0 [ 140.725944][ T8207] ? __fget+0x37c/0x3c0 [ 140.730085][ T8207] ? setup_fault_attr+0x2b0/0x2b0 [ 140.735076][ T8207] ? fget_many+0x20/0x20 [ 140.739289][ T8207] ? io_submit_one+0x158/0x2370 [ 140.744108][ T8207] ? kmem_cache_alloc+0x1d5/0x250 [ 140.749098][ T8207] io_submit_one+0xa21/0x2370 [ 140.753760][ T8207] ? lookup_ioctx+0x460/0x460 [ 140.758414][ T8207] ? page_fault+0x2f/0x40 [ 140.762727][ T8207] ? __rcu_read_lock+0x50/0x50 [ 140.767459][ T8207] ? __se_sys_io_submit+0x90/0x380 [ 140.772557][ T8207] ? lookup_ioctx+0x26e/0x460 [ 140.777217][ T8207] ? security_file_permission+0x128/0x300 [ 140.785959][ T8207] __se_sys_io_submit+0x169/0x380 [ 140.790953][ T8207] ? fput_many+0x42/0x1a0 [ 140.795252][ T8207] ? __x64_sys_io_submit+0x80/0x80 [ 140.800370][ T8207] ? ksys_write+0x237/0x2a0 [ 140.804842][ T8207] ? __ia32_sys_read+0x80/0x80 [ 140.809620][ T8207] ? fput_many+0x42/0x1a0 [ 140.813920][ T8207] do_syscall_64+0xcb/0x150 [ 140.818395][ T8207] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 140.824257][ T8207] RIP: 0033:0x45de89 [ 140.828150][ T8207] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.847747][ T8207] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 140.856127][ T8207] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 140.864071][ T8207] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 140.872199][ T8207] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 140.880313][ T8207] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 140.888254][ T8207] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:00 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:00 executing program 1 (fault-call:2 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x5, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:00 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, 0x0) 01:05:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x8, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:00 executing program 0 (fault-call:11 fault-nth:27): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x60, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:00 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, 0x0) [ 140.977896][ T8220] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 140.988713][ T8219] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 140.999838][ T8230] FAULT_INJECTION: forcing a failure. [ 140.999838][ T8230] name failslab, interval 1, probability 0, space 0, times 0 [ 141.013841][ T8230] CPU: 1 PID: 8230 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 141.023903][ T8230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.034545][ T8230] Call Trace: [ 141.037809][ T8230] dump_stack+0x1b0/0x21e [ 141.042126][ T8230] ? devkmsg_release+0x11c/0x11c [ 141.047037][ T8230] ? show_regs_print_info+0x12/0x12 [ 141.052229][ T8230] ? mpage_release_unused_pages+0x52c/0x5e0 [ 141.058102][ T8230] should_fail+0x6fb/0x860 [ 141.062495][ T8230] ? setup_fault_attr+0x2b0/0x2b0 [ 141.067490][ T8230] ? slab_free_freelist_hook+0xd0/0x150 [ 141.073010][ T8230] ? ext4_init_io_end+0x25/0xf0 [ 141.077834][ T8230] should_failslab+0x5/0x20 [ 141.082327][ T8230] kmem_cache_alloc+0x36/0x250 [ 141.087062][ T8230] ext4_init_io_end+0x25/0xf0 [ 141.091736][ T8230] ext4_writepages+0x157d/0x3d10 [ 141.096660][ T8230] ? __rcu_read_lock+0x50/0x50 [ 141.101396][ T8230] ? account_page_dirtied+0x430/0x570 [ 141.106741][ T8230] ? ext4_readpage+0x2b0/0x2b0 [ 141.111490][ T8230] ? __ext4_journal_start_sb+0x3ad/0x420 [ 141.117091][ T8230] ? ext4_da_write_begin+0xe84/0xfb0 [ 141.122346][ T8230] ? mark_buffer_dirty+0x334/0x380 [ 141.127450][ T8230] ? __block_commit_write+0x226/0x240 [ 141.132796][ T8230] ? ext4_readpage+0x2b0/0x2b0 [ 141.137535][ T8230] do_writepages+0x12e/0x290 [ 141.142098][ T8230] ? __writepage+0xc0/0xc0 [ 141.146483][ T8230] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 141.152816][ T8230] ? ext4_da_write_begin+0xfb0/0xfb0 [ 141.158084][ T8230] ? generic_perform_write+0x48d/0x530 [ 141.163880][ T8230] filemap_write_and_wait_range+0x3b8/0x470 [ 141.169743][ T8230] ? filemap_write_and_wait+0x430/0x430 [ 141.175273][ T8230] ? file_remove_privs+0x600/0x600 [ 141.180363][ T8230] ? ext4_issue_zeroout+0x160/0x160 [ 141.185532][ T8230] __generic_file_write_iter+0x345/0x460 [ 141.191136][ T8230] ext4_file_write_iter+0x9d0/0x1250 [ 141.196418][ T8230] ? ext4_file_read_iter+0x140/0x140 [ 141.201674][ T8230] ? avc_policy_seqno+0x17/0x70 [ 141.206500][ T8230] ? selinux_file_permission+0x2d0/0x520 [ 141.212132][ T8230] ? security_file_permission+0x128/0x300 [ 141.217840][ T8230] aio_write+0x45d/0x5f0 [ 141.222055][ T8230] ? aio_read+0x4a0/0x4a0 [ 141.226371][ T8230] ? __fget+0x37c/0x3c0 [ 141.230521][ T8230] ? setup_fault_attr+0x2b0/0x2b0 [ 141.235526][ T8230] ? fget_many+0x20/0x20 [ 141.239787][ T8230] ? io_submit_one+0x158/0x2370 [ 141.244607][ T8230] ? kmem_cache_alloc+0x1d5/0x250 [ 141.249600][ T8230] io_submit_one+0xa21/0x2370 [ 141.254249][ T8230] ? lookup_ioctx+0x460/0x460 [ 141.258897][ T8230] ? page_fault+0x2f/0x40 [ 141.263221][ T8230] ? __rcu_read_lock+0x50/0x50 [ 141.267969][ T8230] ? __se_sys_io_submit+0x90/0x380 [ 141.273072][ T8230] ? lookup_ioctx+0x26e/0x460 [ 141.277734][ T8230] ? security_file_permission+0x128/0x300 [ 141.283434][ T8230] __se_sys_io_submit+0x169/0x380 [ 141.288540][ T8230] ? fput_many+0x42/0x1a0 [ 141.292842][ T8230] ? __x64_sys_io_submit+0x80/0x80 [ 141.297922][ T8230] ? ksys_write+0x237/0x2a0 [ 141.302396][ T8230] ? __ia32_sys_read+0x80/0x80 [ 141.307176][ T8230] ? fput_many+0x42/0x1a0 [ 141.311482][ T8230] do_syscall_64+0xcb/0x150 [ 141.315959][ T8230] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 141.321831][ T8230] RIP: 0033:0x45de89 [ 141.325719][ T8230] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.345298][ T8230] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 141.353678][ T8230] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 141.361619][ T8230] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 141.369583][ T8230] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 141.377524][ T8230] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 141.385464][ T8230] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 141.398581][ T8234] FAULT_INJECTION: forcing a failure. [ 141.398581][ T8234] name failslab, interval 1, probability 0, space 0, times 0 [ 141.411269][ T8234] CPU: 1 PID: 8234 Comm: syz-executor.1 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 141.421324][ T8234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.431350][ T8234] Call Trace: [ 141.434632][ T8234] dump_stack+0x1b0/0x21e [ 141.438976][ T8234] ? devkmsg_release+0x11c/0x11c [ 141.443883][ T8234] ? setxattr+0x27f/0x400 [ 141.448182][ T8234] ? show_regs_print_info+0x12/0x12 [ 141.453347][ T8234] ? path_setxattr+0x230/0x230 [ 141.458080][ T8234] ? proc_fail_nth_read+0x1c0/0x1c0 [ 141.463262][ T8234] should_fail+0x6fb/0x860 [ 141.467648][ T8234] ? setup_fault_attr+0x2b0/0x2b0 [ 141.472643][ T8234] ? fsnotify+0x13a0/0x1460 [ 141.477131][ T8234] ? getname_flags+0xb8/0x610 [ 141.481778][ T8234] should_failslab+0x5/0x20 [ 141.486264][ T8234] kmem_cache_alloc+0x36/0x250 [ 141.490999][ T8234] getname_flags+0xb8/0x610 [ 141.495476][ T8234] ? security_file_permission+0x128/0x300 [ 141.501181][ T8234] user_path_at_empty+0x28/0x50 [ 141.506001][ T8234] do_fchownat+0xe0/0x240 [ 141.510311][ T8234] ? ksys_write+0x237/0x2a0 [ 141.514798][ T8234] ? __ia32_sys_chmod+0x1b0/0x1b0 [ 141.519792][ T8234] ? __ia32_sys_read+0x80/0x80 [ 141.524733][ T8234] __x64_sys_lchown+0x81/0x90 [ 141.529395][ T8234] do_syscall_64+0xcb/0x150 [ 141.533894][ T8234] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 141.539756][ T8234] RIP: 0033:0x45de89 [ 141.543625][ T8234] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.563239][ T8234] RSP: 002b:00007f7a5e0b8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000005e [ 141.571627][ T8234] RAX: ffffffffffffffda RBX: 0000000000020800 RCX: 000000000045de89 01:05:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:00 executing program 1 (fault-call:2 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x8e, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 141.579606][ T8234] RDX: 000000000000ee01 RSI: 0000000000000000 RDI: 0000000020000040 [ 141.587558][ T8234] RBP: 00007f7a5e0b8ca0 R08: 0000000000000000 R09: 0000000000000000 [ 141.595504][ T8234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 141.603451][ T8234] R13: 00007ffee5a0876f R14: 00007f7a5e0b99c0 R15: 000000000118bfd4 [ 141.715119][ T8240] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 141.725274][ T8244] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:00 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:00 executing program 0 (fault-call:11 fault-nth:28): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x300, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:00 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, &(0x7f0000000540)) 01:05:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x500, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 141.801878][ T8258] FAULT_INJECTION: forcing a failure. [ 141.801878][ T8258] name failslab, interval 1, probability 0, space 0, times 0 [ 141.816161][ T8258] CPU: 0 PID: 8258 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 141.826206][ T8258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.836231][ T8258] Call Trace: [ 141.839753][ T8258] dump_stack+0x1b0/0x21e [ 141.844056][ T8258] ? devkmsg_release+0x11c/0x11c [ 141.848968][ T8258] ? show_regs_print_info+0x12/0x12 [ 141.854150][ T8258] ? arch_stack_walk+0x78/0xe0 [ 141.858895][ T8258] should_fail+0x6fb/0x860 [ 141.863283][ T8258] ? setup_fault_attr+0x2b0/0x2b0 [ 141.868295][ T8258] ? unwind_next_frame+0x1c07/0x22b0 [ 141.873560][ T8258] ? kcalloc+0x2b/0x50 [ 141.877607][ T8258] should_failslab+0x5/0x20 [ 141.882077][ T8258] __kmalloc+0x5f/0x2c0 [ 141.886219][ T8258] ? __rcu_read_lock+0x50/0x50 [ 141.890965][ T8258] kcalloc+0x2b/0x50 [ 141.894829][ T8258] ext4_find_extent+0x2bb/0xce0 [ 141.899663][ T8258] ext4_ext_map_blocks+0x344/0x4650 [ 141.904835][ T8258] ? unwind_get_return_address+0x48/0x90 [ 141.910622][ T8258] ? ext4_ext_release+0x10/0x10 [ 141.915453][ T8258] ? find_get_pages_range_tag+0xa12/0xae0 [ 141.921142][ T8258] ? release_pages+0x9b4/0x9f0 [ 141.925894][ T8258] ? lru_add_drain_cpu+0x3af/0x4e0 [ 141.930975][ T8258] ? __kasan_kmalloc+0x179/0x1b0 [ 141.936143][ T8258] ? down_write+0xd8/0x150 [ 141.940547][ T8258] ? down_read_killable+0x220/0x220 [ 141.945737][ T8258] ? ext4_es_lookup_extent+0x415/0x900 [ 141.951266][ T8258] ext4_map_blocks+0x955/0x1e30 [ 141.956383][ T8258] ? ext4_issue_zeroout+0x160/0x160 [ 141.961548][ T8258] ? write_end_fn+0x150/0x150 [ 141.966210][ T8258] ? setup_fault_attr+0x2b0/0x2b0 [ 141.971207][ T8258] ? slab_free_freelist_hook+0xd0/0x150 [ 141.976742][ T8258] mpage_map_one_extent+0x2d4/0x960 [ 141.981931][ T8258] ? __ext4_journal_start_sb+0x3ad/0x420 [ 141.987541][ T8258] ext4_writepages+0x1d57/0x3d10 [ 141.992451][ T8258] ? ext4_readpage+0x2b0/0x2b0 [ 141.997182][ T8258] ? __ext4_journal_start_sb+0x3ad/0x420 [ 142.002782][ T8258] ? ext4_da_write_begin+0xe84/0xfb0 [ 142.008054][ T8258] ? mark_buffer_dirty+0x334/0x380 [ 142.013153][ T8258] ? __block_commit_write+0x226/0x240 [ 142.018496][ T8258] ? ext4_readpage+0x2b0/0x2b0 [ 142.024016][ T8258] do_writepages+0x12e/0x290 [ 142.028595][ T8258] ? __writepage+0xc0/0xc0 [ 142.032991][ T8258] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 142.039288][ T8258] ? ext4_da_write_begin+0xfb0/0xfb0 [ 142.044570][ T8258] ? generic_perform_write+0x48d/0x530 [ 142.050024][ T8258] filemap_write_and_wait_range+0x3b8/0x470 [ 142.056285][ T8258] ? filemap_write_and_wait+0x430/0x430 [ 142.061833][ T8258] ? file_remove_privs+0x600/0x600 [ 142.066926][ T8258] ? ext4_issue_zeroout+0x160/0x160 [ 142.072097][ T8258] __generic_file_write_iter+0x345/0x460 [ 142.077707][ T8258] ext4_file_write_iter+0x9d0/0x1250 [ 142.082975][ T8258] ? ext4_file_read_iter+0x140/0x140 [ 142.088266][ T8258] ? avc_policy_seqno+0x17/0x70 [ 142.093101][ T8258] ? selinux_file_permission+0x2d0/0x520 [ 142.098704][ T8258] ? security_file_permission+0x128/0x300 [ 142.104401][ T8258] aio_write+0x45d/0x5f0 [ 142.108613][ T8258] ? aio_read+0x4a0/0x4a0 [ 142.112922][ T8258] ? __fget+0x37c/0x3c0 [ 142.117047][ T8258] ? setup_fault_attr+0x2b0/0x2b0 [ 142.122055][ T8258] ? fget_many+0x20/0x20 [ 142.126267][ T8258] ? io_submit_one+0x158/0x2370 [ 142.131100][ T8258] ? kmem_cache_alloc+0x1d5/0x250 [ 142.136106][ T8258] io_submit_one+0xa21/0x2370 [ 142.140766][ T8258] ? lookup_ioctx+0x460/0x460 [ 142.145410][ T8258] ? page_fault+0x2f/0x40 [ 142.149716][ T8258] ? __rcu_read_lock+0x50/0x50 [ 142.154446][ T8258] ? __se_sys_io_submit+0x90/0x380 [ 142.159532][ T8258] ? lookup_ioctx+0x26e/0x460 [ 142.164787][ T8258] ? security_file_permission+0x128/0x300 [ 142.170483][ T8258] __se_sys_io_submit+0x169/0x380 [ 142.175496][ T8258] ? fput_many+0x42/0x1a0 [ 142.179799][ T8258] ? __x64_sys_io_submit+0x80/0x80 [ 142.184890][ T8258] ? ksys_write+0x237/0x2a0 [ 142.189372][ T8258] ? __ia32_sys_read+0x80/0x80 [ 142.194118][ T8258] ? fput_many+0x42/0x1a0 [ 142.198416][ T8258] do_syscall_64+0xcb/0x150 [ 142.202887][ T8258] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.208759][ T8258] RIP: 0033:0x45de89 [ 142.212663][ T8258] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 142.232240][ T8258] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 142.240622][ T8258] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 01:05:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x4000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 142.248570][ T8258] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 142.256657][ T8258] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 142.264613][ T8258] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c [ 142.272555][ T8258] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 142.291640][ T8256] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:05:01 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, &(0x7f0000000540)) 01:05:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x6000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:01 executing program 0 (fault-call:11 fault-nth:29): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 142.353160][ T8268] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 142.384556][ T8276] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 142.408349][ T8283] FAULT_INJECTION: forcing a failure. [ 142.408349][ T8283] name failslab, interval 1, probability 0, space 0, times 0 [ 142.423377][ T8283] CPU: 0 PID: 8283 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 142.433447][ T8283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.443480][ T8283] Call Trace: [ 142.446762][ T8283] dump_stack+0x1b0/0x21e [ 142.451196][ T8283] ? devkmsg_release+0x11c/0x11c [ 142.456127][ T8283] ? show_regs_print_info+0x12/0x12 [ 142.461329][ T8283] ? arch_stack_walk+0x78/0xe0 [ 142.466101][ T8283] should_fail+0x6fb/0x860 [ 142.470499][ T8283] ? setup_fault_attr+0x2b0/0x2b0 [ 142.475505][ T8283] ? unwind_next_frame+0x1c07/0x22b0 [ 142.480769][ T8283] ? kcalloc+0x2b/0x50 [ 142.484817][ T8283] should_failslab+0x5/0x20 [ 142.489302][ T8283] __kmalloc+0x5f/0x2c0 [ 142.494221][ T8283] ? __rcu_read_lock+0x50/0x50 [ 142.498984][ T8283] kcalloc+0x2b/0x50 [ 142.502867][ T8283] ext4_find_extent+0x2bb/0xce0 [ 142.507704][ T8283] ext4_ext_map_blocks+0x344/0x4650 [ 142.512891][ T8283] ? unwind_get_return_address+0x48/0x90 [ 142.518525][ T8283] ? ext4_ext_release+0x10/0x10 [ 142.523361][ T8283] ? find_get_pages_range_tag+0xa12/0xae0 [ 142.529084][ T8283] ? release_pages+0x9b4/0x9f0 [ 142.533917][ T8283] ? lru_add_drain_cpu+0x3af/0x4e0 [ 142.539007][ T8283] ? __kasan_kmalloc+0x179/0x1b0 [ 142.543929][ T8283] ? down_write+0xd8/0x150 [ 142.548345][ T8283] ? down_read_killable+0x220/0x220 [ 142.553533][ T8283] ? ext4_es_lookup_extent+0x415/0x900 [ 142.558982][ T8283] ext4_map_blocks+0x955/0x1e30 [ 142.563820][ T8283] ? ext4_issue_zeroout+0x160/0x160 [ 142.568994][ T8283] ? write_end_fn+0x150/0x150 [ 142.573655][ T8283] ? setup_fault_attr+0x2b0/0x2b0 [ 142.578660][ T8283] ? slab_free_freelist_hook+0xd0/0x150 [ 142.584185][ T8283] mpage_map_one_extent+0x2d4/0x960 [ 142.589363][ T8283] ? __ext4_journal_start_sb+0x3ad/0x420 [ 142.594987][ T8283] ext4_writepages+0x1d57/0x3d10 [ 142.599912][ T8283] ? ext4_readpage+0x2b0/0x2b0 [ 142.604659][ T8283] ? __ext4_journal_start_sb+0x3ad/0x420 [ 142.610275][ T8283] ? ext4_da_write_begin+0xe84/0xfb0 [ 142.615544][ T8283] ? mark_buffer_dirty+0x334/0x380 [ 142.620650][ T8283] ? __block_commit_write+0x226/0x240 [ 142.626017][ T8283] ? ext4_readpage+0x2b0/0x2b0 [ 142.630767][ T8283] do_writepages+0x12e/0x290 [ 142.635336][ T8283] ? __writepage+0xc0/0xc0 [ 142.639732][ T8283] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 142.646047][ T8283] ? ext4_da_write_begin+0xfb0/0xfb0 [ 142.651313][ T8283] ? generic_perform_write+0x48d/0x530 [ 142.656753][ T8283] filemap_write_and_wait_range+0x3b8/0x470 [ 142.662626][ T8283] ? filemap_write_and_wait+0x430/0x430 [ 142.668149][ T8283] ? file_remove_privs+0x600/0x600 [ 142.673255][ T8283] ? ext4_issue_zeroout+0x160/0x160 [ 142.678439][ T8283] __generic_file_write_iter+0x345/0x460 [ 142.684138][ T8283] ext4_file_write_iter+0x9d0/0x1250 [ 142.689402][ T8283] ? ext4_file_read_iter+0x140/0x140 [ 142.694684][ T8283] ? avc_policy_seqno+0x17/0x70 [ 142.699515][ T8283] ? selinux_file_permission+0x2d0/0x520 [ 142.705129][ T8283] ? security_file_permission+0x128/0x300 [ 142.710829][ T8283] aio_write+0x45d/0x5f0 [ 142.715054][ T8283] ? aio_read+0x4a0/0x4a0 [ 142.719885][ T8283] ? __fget+0x37c/0x3c0 [ 142.724024][ T8283] ? setup_fault_attr+0x2b0/0x2b0 [ 142.729028][ T8283] ? fget_many+0x20/0x20 [ 142.733266][ T8283] ? io_submit_one+0x158/0x2370 [ 142.738111][ T8283] ? kmem_cache_alloc+0x1d5/0x250 [ 142.743124][ T8283] io_submit_one+0xa21/0x2370 [ 142.747783][ T8283] ? lookup_ioctx+0x460/0x460 [ 142.752448][ T8283] ? page_fault+0x2f/0x40 [ 142.756758][ T8283] ? __rcu_read_lock+0x50/0x50 [ 142.761498][ T8283] ? __se_sys_io_submit+0x90/0x380 [ 142.766587][ T8283] ? lookup_ioctx+0x26e/0x460 [ 142.771244][ T8283] ? security_file_permission+0x128/0x300 [ 142.776939][ T8283] __se_sys_io_submit+0x169/0x380 [ 142.781942][ T8283] ? fput_many+0x42/0x1a0 [ 142.786251][ T8283] ? __x64_sys_io_submit+0x80/0x80 [ 142.791369][ T8283] ? ksys_write+0x237/0x2a0 [ 142.795859][ T8283] ? __ia32_sys_read+0x80/0x80 [ 142.800602][ T8283] ? fput_many+0x42/0x1a0 [ 142.804915][ T8283] do_syscall_64+0xcb/0x150 [ 142.809402][ T8283] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.815280][ T8283] RIP: 0033:0x45de89 [ 142.819174][ T8283] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 142.838761][ T8283] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 142.847156][ T8283] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 01:05:02 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400, 0xaaaaaaaaaaaaad4, &(0x7f0000000200), 0x200010, &(0x7f0000014a00)=ANY=[]) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000a00)=ANY=[@ANYBLOB="6a4fe14867b61696a64d6d11a50fc683ef10f358c43c3b63501dae46fc000000", @ANYRES16=0x0, @ANYBLOB="010026bd7000fbdbdf251100000005003300000000000a0009000180c20000030000"], 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x4044) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000900)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000000506010140a84145d6cdccf4f166f2cc9bfa7e0000000000000000010000080900030073797a3000000000050001000700000005000100070000000903"], 0x3c}, 0x1, 0x0, 0x0, 0x44040}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x9, &(0x7f0000000640)=[{&(0x7f0000000140)="835b197afc2f0d6061151064ef159e", 0xf, 0x10000}, {&(0x7f0000000180)="a09327cab0683f9374", 0x9, 0x8}, {&(0x7f00000001c0)="077934a671e0c7e5ef56e95e80077a7060dcc93563", 0x15, 0x25f0}, {&(0x7f00000002c0)="d786072a2594efce69634fd60fb719e395bf3741d4274f7d9074948b539e1526ae4a29f8028886820b13680ad37428bade35d5f1da2a202443719eb2c21312d4158f007ecd03e875811833c2f4644ce64706813085f24320b739072a536d8ee8883cf42c238469ca6410c0d805c36de6fa8de5f361363970d5973327262cc050078869b8525bc8786456823b2c64c8eccee5583eb642f7a31a4f4269fa65eea5854f932da1d61160b5e9edcf14853ecdb9b5c2", 0xb3, 0x67b}, {&(0x7f0000000380)="217026f295af820251c590a10467a3978ed6be7a6cddea58ecfad970046cbd3cdc06363a047cff274588a8cc2b90bd10bf65993d37e86ac9f012573654984d465d997ab13afea7152b79d7e093e7e4924aa96feb4e515b84aff0ffac1ab1cae060e7090fc47103753f57c0ff0d7366b42209553ad8f5b3dbde2ab9fcc2356d76fda6840488b793e587aa47762128ecb1bf2dca2c48a537318014", 0x9a}, {&(0x7f0000000440)="8e2f48e0e664638e401c3776b6ac399bc6af48a315b687b9a86fa97b915080f60b7d5a7d51a30fa573351cd44c0b09a4cc39270c0431918e1b5d942f0d734ffd6e96d22ced88dcd144cba80bc429904a5e83de78c87fc1f46beb17e884d748263f1ee4f076c98c87473ff96530934176a889746d0b705945ec7eb7d5fa3261397ec3fbe2cac879c12d3de1d6f57bf06a2dea", 0x92, 0x3}, {&(0x7f0000000500)="b062190c0e05701fbad33e764b079560bb602a79aac45a5ae486c15bc939553afd33f90ee4139fab0a85fcb3407023c05c81f040a01e416a889c368f226b", 0x3e, 0x4}, {&(0x7f0000000540)="59a73710ce6f7f6793a2c41a0fe521b575f06d0760cebd1aa5ddfb93974dbfc53a487305503372cacc214e7ecddf06bb02ba7523ef8022ba8cb20cd090cc020a4a4fc175fa719c173f0e3bb483118665c5a9b0eab3306e2bcd2fc9b7a7bb870f1f1c78e1c9288ad1357a039d75c7f202d79ce4b59c545c727a1ff2fc04af3618961e32e7c0d3a5ec032bbfcffcd8c18a9ab50d39abc9e3d8ffc6f71cd72d", 0x9e, 0xc1}, {&(0x7f0000000600)="5dcb21bd50d53910279729254da85320800b7164478c2440efe0df10b339e4107a1464c0f399", 0x26, 0x10000}], 0x80000, &(0x7f0000000740)=ANY=[@ANYBLOB="686a26fe742c61707072616973652c00"]) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000001000)={'ip6tnl0\x00', &(0x7f0000000f80)={'syztnl2\x00', 0x0, 0x0, 0x3f, 0x9d, 0x80000001, 0x50, @empty, @private1, 0x20, 0x8000, 0x8, 0x60}}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="6c00000024001d0600"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff"], 0x6c}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="6c00000024001d0600"/20, @ANYRES32=r7, @ANYBLOB="00000000f1ffffff"], 0x6c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000001300)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="54020000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fedbdf25070000004000018014000200766c616e3100000000000000000000001400020076657468315f746f5f7465616d0000001400020067656e65766531000000000000000000200001801400020067656e6576653000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="4000018008000100", @ANYRESHEX, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006772653000000000000000000000000008000300010000000800030001000000540001801400020067656e65766530000000000000000000140002007465616d5f736c6176655f3000000000140002006d6163766c616e300000000000000000140002006d6163766c616e31000000000000000014000180080003000200000008000100", @ANYRES32, @ANYBLOB="6000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="14000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006d616376746170300000000000000000140002006d616373656330000000000000000000780001800800030003000000080003000100000008000300010000001400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="14000200726f7365300000000000000000000000140002006970766c616e310000000000000000000800030000000000040001805c000180140002007767300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="08010900", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="1400020076657468305f6d616376746170000000"], 0x254}, 0x1, 0x0, 0x0, 0xc080}, 0x240548c4) 01:05:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x8100, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:02 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x0, &(0x7f0000000540)) 01:05:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 142.855129][ T8283] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 142.863084][ T8283] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 142.871038][ T8283] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 142.878993][ T8283] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:02 executing program 0 (fault-call:11 fault-nth:30): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 142.953028][ T8292] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:05:02 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 01:05:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x8e00, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 142.996062][ T8300] FAULT_INJECTION: forcing a failure. [ 142.996062][ T8300] name failslab, interval 1, probability 0, space 0, times 0 [ 143.009957][ T8300] CPU: 0 PID: 8300 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 143.020022][ T8300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.030078][ T8300] Call Trace: [ 143.033358][ T8300] dump_stack+0x1b0/0x21e [ 143.037666][ T8300] ? devkmsg_release+0x11c/0x11c [ 143.042688][ T8300] ? __kasan_kmalloc+0x179/0x1b0 [ 143.047610][ T8300] ? show_regs_print_info+0x12/0x12 [ 143.052813][ T8300] ? __kmalloc+0xf7/0x2c0 [ 143.057122][ T8300] ? kcalloc+0x2b/0x50 [ 143.061172][ T8300] ? ext4_find_extent+0x2bb/0xce0 [ 143.066181][ T8300] ? ext4_map_blocks+0x955/0x1e30 [ 143.071187][ T8300] ? mpage_map_one_extent+0x2d4/0x960 [ 143.076541][ T8300] ? ext4_writepages+0x1d57/0x3d10 [ 143.081653][ T8300] ? do_writepages+0x12e/0x290 [ 143.086402][ T8300] should_fail+0x6fb/0x860 [ 143.090812][ T8300] ? setup_fault_attr+0x2b0/0x2b0 [ 143.095814][ T8300] ? _raw_write_lock+0xa1/0x170 [ 143.100644][ T8300] ? ext4_mb_new_blocks+0x423/0x28a0 [ 143.105909][ T8300] should_failslab+0x5/0x20 [ 143.110394][ T8300] kmem_cache_alloc+0x36/0x250 [ 143.115141][ T8300] ? unwind_get_return_address_ptr+0x130/0x130 [ 143.121284][ T8300] ? memset+0x1f/0x40 [ 143.125248][ T8300] ext4_mb_new_blocks+0x423/0x28a0 [ 143.130342][ T8300] ? __kmalloc+0xf7/0x2c0 [ 143.134649][ T8300] ? kcalloc+0x2b/0x50 [ 143.138699][ T8300] ? __rcu_read_lock+0x50/0x50 [ 143.143443][ T8300] ? ext4_mb_pa_callback+0xc0/0xc0 [ 143.148532][ T8300] ext4_ext_map_blocks+0x2d6d/0x4650 [ 143.153798][ T8300] ? ext4_ext_release+0x10/0x10 [ 143.158736][ T8300] ? find_get_pages_range_tag+0xa12/0xae0 [ 143.164453][ T8300] ? release_pages+0x9b4/0x9f0 [ 143.169195][ T8300] ? lru_add_drain_cpu+0x3af/0x4e0 [ 143.174296][ T8300] ? __kasan_kmalloc+0x179/0x1b0 [ 143.179226][ T8300] ? ext4_es_lookup_extent+0x415/0x900 [ 143.184681][ T8300] ext4_map_blocks+0x955/0x1e30 [ 143.189512][ T8300] ? ext4_issue_zeroout+0x160/0x160 [ 143.194686][ T8300] ? write_end_fn+0x150/0x150 [ 143.199345][ T8300] ? setup_fault_attr+0x2b0/0x2b0 [ 143.204443][ T8300] ? slab_free_freelist_hook+0xd0/0x150 [ 143.209973][ T8300] mpage_map_one_extent+0x2d4/0x960 [ 143.215154][ T8300] ? __ext4_journal_start_sb+0x3ad/0x420 [ 143.220789][ T8300] ext4_writepages+0x1d57/0x3d10 [ 143.225719][ T8300] ? ext4_readpage+0x2b0/0x2b0 [ 143.230472][ T8300] ? __ext4_journal_start_sb+0x3ad/0x420 [ 143.236097][ T8300] ? ext4_da_write_begin+0xe84/0xfb0 [ 143.241381][ T8300] ? mark_buffer_dirty+0x334/0x380 [ 143.246472][ T8300] ? __block_commit_write+0x226/0x240 [ 143.251824][ T8300] ? ext4_readpage+0x2b0/0x2b0 [ 143.256577][ T8300] do_writepages+0x12e/0x290 [ 143.261149][ T8300] ? __writepage+0xc0/0xc0 [ 143.265545][ T8300] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 143.271860][ T8300] ? ext4_da_write_begin+0xfb0/0xfb0 [ 143.277131][ T8300] ? generic_perform_write+0x48d/0x530 [ 143.282569][ T8300] filemap_write_and_wait_range+0x3b8/0x470 [ 143.288441][ T8300] ? filemap_write_and_wait+0x430/0x430 [ 143.293965][ T8300] ? file_remove_privs+0x600/0x600 [ 143.299073][ T8300] ? ext4_issue_zeroout+0x160/0x160 [ 143.304266][ T8300] __generic_file_write_iter+0x345/0x460 [ 143.309880][ T8300] ext4_file_write_iter+0x9d0/0x1250 [ 143.315239][ T8300] ? ext4_file_read_iter+0x140/0x140 [ 143.320508][ T8300] ? avc_policy_seqno+0x17/0x70 [ 143.325339][ T8300] ? selinux_file_permission+0x2d0/0x520 [ 143.330985][ T8300] ? security_file_permission+0x128/0x300 [ 143.336693][ T8300] aio_write+0x45d/0x5f0 [ 143.341025][ T8300] ? aio_read+0x4a0/0x4a0 [ 143.345334][ T8300] ? __fget+0x37c/0x3c0 [ 143.349473][ T8300] ? setup_fault_attr+0x2b0/0x2b0 [ 143.354492][ T8300] ? fget_many+0x20/0x20 [ 143.358720][ T8300] ? io_submit_one+0x158/0x2370 [ 143.363814][ T8300] ? kmem_cache_alloc+0x1d5/0x250 [ 143.368820][ T8300] io_submit_one+0xa21/0x2370 [ 143.373483][ T8300] ? lookup_ioctx+0x460/0x460 [ 143.378141][ T8300] ? page_fault+0x2f/0x40 [ 143.382459][ T8300] ? __rcu_read_lock+0x50/0x50 [ 143.387202][ T8300] ? __se_sys_io_submit+0x90/0x380 [ 143.392293][ T8300] ? lookup_ioctx+0x26e/0x460 [ 143.396973][ T8300] ? security_file_permission+0x128/0x300 [ 143.402671][ T8300] __se_sys_io_submit+0x169/0x380 [ 143.407674][ T8300] ? fput_many+0x42/0x1a0 [ 143.411987][ T8300] ? __x64_sys_io_submit+0x80/0x80 [ 143.417100][ T8300] ? ksys_write+0x237/0x2a0 [ 143.421581][ T8300] ? __ia32_sys_read+0x80/0x80 [ 143.426839][ T8300] ? fput_many+0x42/0x1a0 [ 143.431147][ T8300] do_syscall_64+0xcb/0x150 [ 143.435639][ T8300] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 143.441601][ T8300] RIP: 0033:0x45de89 [ 143.445495][ T8300] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.465169][ T8300] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 143.473561][ T8300] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 143.481511][ T8300] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 143.489548][ T8300] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 143.497508][ T8300] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 143.505470][ T8300] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x1000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:02 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 01:05:02 executing program 0 (fault-call:11 fault-nth:31): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 143.599942][ T8303] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.617474][ T8303] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.632476][ T8313] EXT4-fs (loop2): invalid first ino: 0 [ 143.696690][ T8320] FAULT_INJECTION: forcing a failure. [ 143.696690][ T8320] name failslab, interval 1, probability 0, space 0, times 0 [ 143.709542][ T8320] CPU: 0 PID: 8320 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 143.719611][ T8320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.729671][ T8320] Call Trace: [ 143.733002][ T8320] dump_stack+0x1b0/0x21e [ 143.737338][ T8320] ? devkmsg_release+0x11c/0x11c [ 143.742286][ T8320] ? show_regs_print_info+0x12/0x12 [ 143.747501][ T8320] ? __es_remove_extent+0x14a1/0x2290 [ 143.752900][ T8320] should_fail+0x6fb/0x860 [ 143.757331][ T8320] ? setup_fault_attr+0x2b0/0x2b0 [ 143.762367][ T8320] ? __es_insert_extent+0x7a4/0x1770 [ 143.767659][ T8320] should_failslab+0x5/0x20 [ 143.772178][ T8320] kmem_cache_alloc+0x36/0x250 [ 143.776949][ T8320] __es_insert_extent+0x7a4/0x1770 [ 143.782086][ T8320] ext4_es_insert_extent+0x42b/0x2f40 [ 143.787479][ T8320] ? ext4_es_scan_clu+0x270/0x270 [ 143.792521][ T8320] ? ext4_es_lookup_extent+0x415/0x900 [ 143.798015][ T8320] ext4_map_blocks+0xe27/0x1e30 [ 143.802888][ T8320] ? ext4_issue_zeroout+0x160/0x160 [ 143.808095][ T8320] ? write_end_fn+0x150/0x150 [ 143.812778][ T8320] ? setup_fault_attr+0x2b0/0x2b0 [ 143.817819][ T8320] ? slab_free_freelist_hook+0xd0/0x150 [ 143.823374][ T8320] mpage_map_one_extent+0x2d4/0x960 [ 143.828587][ T8320] ? __ext4_journal_start_sb+0x3ad/0x420 [ 143.834235][ T8320] ext4_writepages+0x1d57/0x3d10 [ 143.839201][ T8320] ? ext4_readpage+0x2b0/0x2b0 [ 143.844173][ T8320] ? __ext4_journal_start_sb+0x3ad/0x420 [ 143.849859][ T8320] ? ext4_da_write_begin+0xe84/0xfb0 [ 143.855180][ T8320] ? mark_buffer_dirty+0x334/0x380 [ 143.860308][ T8320] ? __block_commit_write+0x226/0x240 [ 143.865694][ T8320] ? ext4_readpage+0x2b0/0x2b0 [ 143.870475][ T8320] do_writepages+0x12e/0x290 [ 143.875188][ T8320] ? __writepage+0xc0/0xc0 [ 143.879620][ T8320] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 143.885972][ T8320] ? ext4_da_write_begin+0xfb0/0xfb0 [ 143.891289][ T8320] ? generic_perform_write+0x48d/0x530 [ 143.896761][ T8320] filemap_write_and_wait_range+0x3b8/0x470 [ 143.902672][ T8320] ? filemap_write_and_wait+0x430/0x430 [ 143.908241][ T8320] ? file_remove_privs+0x600/0x600 [ 143.913368][ T8320] ? ext4_issue_zeroout+0x160/0x160 [ 143.918588][ T8320] __generic_file_write_iter+0x345/0x460 [ 143.924243][ T8320] ext4_file_write_iter+0x9d0/0x1250 [ 143.929548][ T8320] ? ext4_file_read_iter+0x140/0x140 [ 143.934856][ T8320] ? avc_policy_seqno+0x17/0x70 [ 143.939737][ T8320] ? selinux_file_permission+0x2d0/0x520 [ 143.945386][ T8320] ? security_file_permission+0x128/0x300 [ 143.951117][ T8320] aio_write+0x45d/0x5f0 [ 143.955377][ T8320] ? aio_read+0x4a0/0x4a0 [ 143.959722][ T8320] ? get_random_u32+0x112/0x210 [ 143.964607][ T8320] ? kasan_init_slab_obj+0x20/0x30 [ 143.969821][ T8320] ? setup_object+0x7a/0x120 [ 143.974423][ T8320] ? __fget+0x37c/0x3c0 [ 143.978600][ T8320] ? fget_many+0x20/0x20 [ 143.982853][ T8320] ? io_submit_one+0x158/0x2370 [ 143.987732][ T8320] ? kmem_cache_alloc+0x1d5/0x250 [ 143.992760][ T8320] io_submit_one+0xa21/0x2370 [ 143.997563][ T8320] ? lookup_ioctx+0x460/0x460 [ 144.002792][ T8320] ? page_fault+0x2f/0x40 [ 144.007137][ T8320] ? __rcu_read_lock+0x50/0x50 [ 144.011923][ T8320] ? __se_sys_io_submit+0x90/0x380 [ 144.017047][ T8320] ? lookup_ioctx+0x26e/0x460 [ 144.021746][ T8320] ? security_file_permission+0x128/0x300 [ 144.027515][ T8320] __se_sys_io_submit+0x169/0x380 [ 144.032552][ T8320] ? fput_many+0x42/0x1a0 [ 144.036907][ T8320] ? __x64_sys_io_submit+0x80/0x80 [ 144.042058][ T8320] ? ksys_write+0x237/0x2a0 [ 144.047536][ T8320] ? __ia32_sys_read+0x80/0x80 [ 144.052343][ T8320] ? fput_many+0x42/0x1a0 [ 144.056685][ T8320] do_syscall_64+0xcb/0x150 [ 144.061223][ T8320] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.067175][ T8320] RIP: 0033:0x45de89 [ 144.071101][ T8320] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.090745][ T8320] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 144.099319][ T8320] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 144.107304][ T8320] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 144.115290][ T8320] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 144.123279][ T8320] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 144.131256][ T8320] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:03 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:03 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"ce3888c04ac464f95bbb92e479e6606d", 0x0, 0x0, {0xffff, 0xc7}, {0xe12, 0x40}, 0x0, [0x7fff, 0x4, 0xc1, 0x7ff, 0x0, 0x7, 0x6, 0x0, 0x6, 0x1ff, 0x3, 0x81, 0x100000001, 0x100000001, 0x7ff, 0xb4cd]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000003c0)={"95b57d059815c036b887cfce79e5293c", 0x0, r1, {0x1ff, 0x6}, {0x7, 0x9}, 0x8, [0x3, 0x3, 0xfffffffffffffffd, 0x9, 0x7, 0x6, 0x80, 0x0, 0x7, 0x4, 0x10000, 0x5, 0x4, 0x1000, 0x100000000, 0x9]}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x2000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:03 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 01:05:03 executing program 0 (fault-call:11 fault-nth:32): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 144.327985][ T8303] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x3000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 144.381543][ T8339] FAULT_INJECTION: forcing a failure. [ 144.381543][ T8339] name failslab, interval 1, probability 0, space 0, times 0 [ 144.394306][ T8339] CPU: 0 PID: 8339 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 144.404432][ T8339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.414463][ T8339] Call Trace: [ 144.417743][ T8339] dump_stack+0x1b0/0x21e [ 144.422068][ T8339] ? devkmsg_release+0x11c/0x11c [ 144.426997][ T8339] ? __schedule+0x8ae/0xe30 [ 144.431510][ T8339] ? show_regs_print_info+0x12/0x12 [ 144.436704][ T8339] should_fail+0x6fb/0x860 [ 144.441102][ T8339] ? setup_fault_attr+0x2b0/0x2b0 [ 144.446106][ T8339] ? should_fail+0x182/0x860 [ 144.450689][ T8339] ? preempt_schedule+0xeb/0x110 [ 144.455620][ T8339] ? setup_fault_attr+0x2b0/0x2b0 [ 144.460624][ T8339] ? __es_insert_extent+0x1157/0x1770 [ 144.465975][ T8339] ? mempool_alloc_slab+0x16/0x30 [ 144.470976][ T8339] ? mempool_free+0x380/0x380 [ 144.475644][ T8339] should_failslab+0x5/0x20 [ 144.480147][ T8339] kmem_cache_alloc+0x36/0x250 [ 144.484889][ T8339] ? mempool_free+0x380/0x380 [ 144.489544][ T8339] mempool_alloc_slab+0x16/0x30 [ 144.494372][ T8339] mempool_alloc+0x100/0x650 [ 144.498945][ T8339] ? mempool_alloc_slab+0x25/0x30 [ 144.503948][ T8339] ? _raw_spin_lock+0x170/0x170 [ 144.508776][ T8339] ? mempool_resize+0x910/0x910 [ 144.513609][ T8339] ? mempool_resize+0x910/0x910 [ 144.518441][ T8339] ? xas_clear_mark+0x1ce/0x220 [ 144.523280][ T8339] ? __test_set_page_writeback+0x839/0x990 [ 144.529067][ T8339] bvec_alloc+0x149/0x190 [ 144.533376][ T8339] bio_alloc_bioset+0x3a5/0x660 [ 144.538206][ T8339] ? bio_chain_endio+0xf0/0xf0 [ 144.542965][ T8339] ? percpu_counter_add_batch+0x12d/0x150 [ 144.548690][ T8339] ext4_bio_write_page+0xfd6/0x17a0 [ 144.553869][ T8339] mpage_submit_page+0x1ae/0x230 [ 144.558788][ T8339] ext4_writepages+0x21f4/0x3d10 [ 144.563713][ T8339] ? ext4_readpage+0x2b0/0x2b0 [ 144.568481][ T8339] ? __ext4_journal_start_sb+0x3ad/0x420 [ 144.574186][ T8339] ? ext4_da_write_begin+0xe84/0xfb0 [ 144.579456][ T8339] ? mark_buffer_dirty+0x334/0x380 [ 144.584549][ T8339] ? __block_commit_write+0x226/0x240 [ 144.589928][ T8339] ? ext4_readpage+0x2b0/0x2b0 [ 144.594678][ T8339] do_writepages+0x12e/0x290 [ 144.599246][ T8339] ? __writepage+0xc0/0xc0 [ 144.603669][ T8339] ? balance_dirty_pages_ratelimited+0x31d/0x4e0 [ 144.609987][ T8339] ? ext4_da_write_begin+0xfb0/0xfb0 [ 144.615254][ T8339] ? generic_perform_write+0x48d/0x530 [ 144.620715][ T8339] filemap_write_and_wait_range+0x3b8/0x470 [ 144.626604][ T8339] ? filemap_write_and_wait+0x430/0x430 [ 144.632128][ T8339] ? file_remove_privs+0x600/0x600 [ 144.637216][ T8339] ? ext4_issue_zeroout+0x160/0x160 [ 144.642408][ T8339] __generic_file_write_iter+0x345/0x460 [ 144.648029][ T8339] ext4_file_write_iter+0x9d0/0x1250 [ 144.653294][ T8339] ? ext4_file_read_iter+0x140/0x140 [ 144.658556][ T8339] ? avc_policy_seqno+0x17/0x70 [ 144.663387][ T8339] ? selinux_file_permission+0x2d0/0x520 [ 144.669005][ T8339] ? security_file_permission+0x128/0x300 [ 144.674709][ T8339] aio_write+0x45d/0x5f0 [ 144.678934][ T8339] ? aio_read+0x4a0/0x4a0 [ 144.683246][ T8339] ? __fget+0x37c/0x3c0 [ 144.687382][ T8339] ? setup_fault_attr+0x2b0/0x2b0 [ 144.692404][ T8339] ? fget_many+0x20/0x20 [ 144.696626][ T8339] ? io_submit_one+0x158/0x2370 [ 144.701456][ T8339] ? kmem_cache_alloc+0x1d5/0x250 [ 144.706454][ T8339] io_submit_one+0xa21/0x2370 [ 144.711112][ T8339] ? lookup_ioctx+0x460/0x460 [ 144.715765][ T8339] ? page_fault+0x2f/0x40 [ 144.720077][ T8339] ? __rcu_read_lock+0x50/0x50 [ 144.724825][ T8339] ? __se_sys_io_submit+0x90/0x380 [ 144.729917][ T8339] ? lookup_ioctx+0x26e/0x460 [ 144.734573][ T8339] ? security_file_permission+0x128/0x300 [ 144.740273][ T8339] __se_sys_io_submit+0x169/0x380 [ 144.745320][ T8339] ? fput_many+0x42/0x1a0 [ 144.749630][ T8339] ? __x64_sys_io_submit+0x80/0x80 [ 144.754717][ T8339] ? ksys_write+0x237/0x2a0 [ 144.759198][ T8339] ? __ia32_sys_read+0x80/0x80 [ 144.763947][ T8339] ? fput_many+0x42/0x1a0 [ 144.768256][ T8339] do_syscall_64+0xcb/0x150 [ 144.772742][ T8339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.778624][ T8339] RIP: 0033:0x45de89 [ 144.782498][ T8339] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.802104][ T8339] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 144.810498][ T8339] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 144.818492][ T8339] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 01:05:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x4000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 144.826446][ T8339] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 144.834396][ T8339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 [ 144.842357][ T8339] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:03 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:04 executing program 0 (fault-call:11 fault-nth:33): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x5000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 144.896629][ T8338] EXT4-fs (loop2): invalid first ino: 0 [ 144.927599][ T8345] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 144.965693][ T8359] EXT4-fs (loop2): invalid first ino: 0 [ 144.989760][ T8366] FAULT_INJECTION: forcing a failure. [ 144.989760][ T8366] name failslab, interval 1, probability 0, space 0, times 0 [ 145.003062][ T8366] CPU: 1 PID: 8366 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 145.013124][ T8366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.023200][ T8366] Call Trace: [ 145.026494][ T8366] dump_stack+0x1b0/0x21e [ 145.030807][ T8366] ? devkmsg_release+0x11c/0x11c [ 145.035717][ T8366] ? show_regs_print_info+0x12/0x12 [ 145.040897][ T8366] ? stack_trace_save+0x1e0/0x1e0 [ 145.045929][ T8366] ? __kernel_text_address+0x93/0x110 [ 145.051283][ T8366] ? unwind_get_return_address+0x48/0x90 [ 145.056900][ T8366] should_fail+0x6fb/0x860 [ 145.061289][ T8366] ? setup_fault_attr+0x2b0/0x2b0 [ 145.066376][ T8366] ? stack_trace_save+0x111/0x1e0 [ 145.071379][ T8366] ? mempool_alloc_slab+0x16/0x30 [ 145.076375][ T8366] ? mempool_free+0x380/0x380 [ 145.081027][ T8366] should_failslab+0x5/0x20 [ 145.085540][ T8366] kmem_cache_alloc+0x36/0x250 [ 145.090285][ T8366] ? mempool_free+0x380/0x380 [ 145.094937][ T8366] mempool_alloc_slab+0x16/0x30 [ 145.099780][ T8366] mempool_alloc+0x100/0x650 [ 145.104342][ T8366] ? write_boundary_block+0x150/0x150 [ 145.109686][ T8366] ? kmem_cache_free+0xac/0x5c0 [ 145.114512][ T8366] ? xas_find_marked+0x95e/0xa10 [ 145.119425][ T8366] ? __rcu_read_lock+0x50/0x50 [ 145.124172][ T8366] ? mempool_resize+0x910/0x910 [ 145.128996][ T8366] ? __getblk_gfp+0x3a/0x750 [ 145.133556][ T8366] bio_alloc_bioset+0x1fc/0x660 [ 145.138385][ T8366] ? __ext4_get_inode_loc+0x499/0x1030 [ 145.143841][ T8366] ? bio_chain_endio+0xf0/0xf0 [ 145.148593][ T8366] submit_bh_wbc+0x1ba/0x790 [ 145.153204][ T8366] ? ext4_get_inode_loc+0x60/0x60 [ 145.158200][ T8366] ? pagevec_lookup_range_tag+0x37/0x80 [ 145.163726][ T8366] ? __filemap_fdatawait_range+0x2c3/0x350 [ 145.169504][ T8366] __sync_dirty_buffer+0x1d2/0x2d0 [ 145.174604][ T8366] ext4_write_inode+0x3b1/0x640 [ 145.179425][ T8366] ? __ext4_iget+0x48a0/0x48a0 [ 145.184159][ T8366] ? release_pages+0x9b4/0x9f0 [ 145.188903][ T8366] ? _raw_spin_lock+0xa1/0x170 [ 145.193637][ T8366] ? _raw_spin_trylock_bh+0x190/0x190 [ 145.199001][ T8366] write_inode+0x101/0x390 [ 145.203390][ T8366] __writeback_single_inode+0x611/0x820 [ 145.208917][ T8366] writeback_single_inode+0x211/0x770 [ 145.214283][ T8366] ? write_inode_now+0x330/0x330 [ 145.219188][ T8366] ? sync_mapping_buffers+0x652/0xe80 [ 145.224534][ T8366] ? __writepage+0xc0/0xc0 [ 145.228922][ T8366] sync_inode_metadata+0xe6/0x170 [ 145.233930][ T8366] ? emergency_thaw_bdev+0xc0/0xc0 [ 145.239025][ T8366] ? sync_inode+0x20/0x20 [ 145.243338][ T8366] ? down_read_killable+0x220/0x220 [ 145.248521][ T8366] __generic_file_fsync+0x13c/0x190 [ 145.253697][ T8366] ext4_sync_file+0x4b7/0xc80 [ 145.258439][ T8366] ext4_file_write_iter+0xa96/0x1250 [ 145.263698][ T8366] ? ext4_file_read_iter+0x140/0x140 [ 145.268954][ T8366] ? avc_policy_seqno+0x17/0x70 [ 145.273787][ T8366] ? selinux_file_permission+0x2d0/0x520 [ 145.279407][ T8366] ? security_file_permission+0x128/0x300 [ 145.285116][ T8366] aio_write+0x45d/0x5f0 [ 145.289344][ T8366] ? aio_read+0x4a0/0x4a0 [ 145.293652][ T8366] ? __fget+0x37c/0x3c0 [ 145.297790][ T8366] ? setup_fault_attr+0x2b0/0x2b0 [ 145.302781][ T8366] ? fget_many+0x20/0x20 [ 145.306997][ T8366] ? io_submit_one+0x158/0x2370 [ 145.311819][ T8366] ? kmem_cache_alloc+0x1d5/0x250 [ 145.317331][ T8366] io_submit_one+0xa21/0x2370 [ 145.321986][ T8366] ? lookup_ioctx+0x460/0x460 [ 145.326651][ T8366] ? page_fault+0x2f/0x40 [ 145.330967][ T8366] ? __rcu_read_lock+0x50/0x50 [ 145.335755][ T8366] ? __se_sys_io_submit+0x90/0x380 [ 145.340930][ T8366] ? lookup_ioctx+0x26e/0x460 [ 145.345581][ T8366] ? security_file_permission+0x128/0x300 [ 145.351273][ T8366] __se_sys_io_submit+0x169/0x380 [ 145.356627][ T8366] ? fput_many+0x42/0x1a0 [ 145.360954][ T8366] ? __x64_sys_io_submit+0x80/0x80 [ 145.366053][ T8366] ? ksys_write+0x237/0x2a0 [ 145.370525][ T8366] ? __ia32_sys_read+0x80/0x80 [ 145.375270][ T8366] ? fput_many+0x42/0x1a0 [ 145.379570][ T8366] do_syscall_64+0xcb/0x150 [ 145.384045][ T8366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 145.390865][ T8366] RIP: 0033:0x45de89 [ 145.394738][ T8366] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:05:04 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) 01:05:04 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x8000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 145.414334][ T8366] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 145.422728][ T8366] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 145.430688][ T8366] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 145.438628][ T8366] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 145.446600][ T8366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 145.454554][ T8366] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x40000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x60000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:04 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:04 executing program 0 (fault-call:11 fault-nth:34): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000080)={0x1, 0x2, 0x800, 0x0, 0x10000}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x81000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 145.563726][ T8375] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 145.587933][ T8380] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 145.636302][ T8393] FAULT_INJECTION: forcing a failure. [ 145.636302][ T8393] name failslab, interval 1, probability 0, space 0, times 0 [ 145.649250][ T8393] CPU: 0 PID: 8393 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 145.659293][ T8393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.669327][ T8393] Call Trace: [ 145.672608][ T8393] dump_stack+0x1b0/0x21e [ 145.676919][ T8393] ? devkmsg_release+0x11c/0x11c [ 145.681837][ T8393] ? show_regs_print_info+0x12/0x12 [ 145.687019][ T8393] ? stack_trace_save+0x1e0/0x1e0 [ 145.692027][ T8393] ? __kernel_text_address+0x93/0x110 [ 145.697377][ T8393] ? unwind_get_return_address+0x48/0x90 [ 145.703000][ T8393] should_fail+0x6fb/0x860 [ 145.707402][ T8393] ? setup_fault_attr+0x2b0/0x2b0 [ 145.712406][ T8393] ? stack_trace_save+0x111/0x1e0 [ 145.717446][ T8393] ? mempool_alloc_slab+0x16/0x30 [ 145.722447][ T8393] ? mempool_free+0x380/0x380 [ 145.727116][ T8393] should_failslab+0x5/0x20 [ 145.731600][ T8393] kmem_cache_alloc+0x36/0x250 [ 145.736346][ T8393] ? mempool_free+0x380/0x380 [ 145.741002][ T8393] mempool_alloc_slab+0x16/0x30 [ 145.745846][ T8393] mempool_alloc+0x100/0x650 [ 145.750420][ T8393] ? write_boundary_block+0x150/0x150 [ 145.755771][ T8393] ? kmem_cache_free+0xac/0x5c0 [ 145.760598][ T8393] ? xas_find_marked+0x95e/0xa10 [ 145.765513][ T8393] ? __rcu_read_lock+0x50/0x50 [ 145.770258][ T8393] ? mempool_resize+0x910/0x910 [ 145.775089][ T8393] ? __getblk_gfp+0x3a/0x750 [ 145.779664][ T8393] bio_alloc_bioset+0x1fc/0x660 [ 145.784517][ T8393] ? __ext4_get_inode_loc+0x499/0x1030 [ 145.789955][ T8393] ? bio_chain_endio+0xf0/0xf0 [ 145.794701][ T8393] submit_bh_wbc+0x1ba/0x790 [ 145.799292][ T8393] ? ext4_get_inode_loc+0x60/0x60 [ 145.804296][ T8393] ? pagevec_lookup_range_tag+0x37/0x80 [ 145.809827][ T8393] ? __filemap_fdatawait_range+0x2c3/0x350 [ 145.815613][ T8393] __sync_dirty_buffer+0x1d2/0x2d0 [ 145.820716][ T8393] ext4_write_inode+0x3b1/0x640 [ 145.825548][ T8393] ? __ext4_iget+0x48a0/0x48a0 [ 145.830292][ T8393] ? release_pages+0x9b4/0x9f0 [ 145.835050][ T8393] ? _raw_spin_lock+0xa1/0x170 [ 145.839790][ T8393] ? _raw_spin_trylock_bh+0x190/0x190 [ 145.845150][ T8393] write_inode+0x101/0x390 [ 145.849552][ T8393] __writeback_single_inode+0x611/0x820 [ 145.855095][ T8393] writeback_single_inode+0x211/0x770 [ 145.860450][ T8393] ? write_inode_now+0x330/0x330 [ 145.865366][ T8393] ? sync_mapping_buffers+0x652/0xe80 [ 145.870714][ T8393] ? __writepage+0xc0/0xc0 [ 145.875108][ T8393] sync_inode_metadata+0xe6/0x170 [ 145.880108][ T8393] ? emergency_thaw_bdev+0xc0/0xc0 [ 145.885193][ T8393] ? sync_inode+0x20/0x20 [ 145.889499][ T8393] ? down_read_killable+0x220/0x220 [ 145.894672][ T8393] __generic_file_fsync+0x13c/0x190 [ 145.899847][ T8393] ext4_sync_file+0x4b7/0xc80 [ 145.904506][ T8393] ext4_file_write_iter+0xa96/0x1250 [ 145.909772][ T8393] ? ext4_file_read_iter+0x140/0x140 [ 145.915035][ T8393] ? avc_policy_seqno+0x17/0x70 [ 145.919862][ T8393] ? selinux_file_permission+0x2d0/0x520 [ 145.925474][ T8393] ? security_file_permission+0x128/0x300 [ 145.931169][ T8393] aio_write+0x45d/0x5f0 [ 145.935391][ T8393] ? aio_read+0x4a0/0x4a0 [ 145.939716][ T8393] ? __fget+0x37c/0x3c0 [ 145.943854][ T8393] ? setup_fault_attr+0x2b0/0x2b0 [ 145.948857][ T8393] ? fget_many+0x20/0x20 [ 145.953089][ T8393] ? io_submit_one+0x158/0x2370 [ 145.957917][ T8393] ? kmem_cache_alloc+0x1d5/0x250 [ 145.962917][ T8393] io_submit_one+0xa21/0x2370 [ 145.967576][ T8393] ? lookup_ioctx+0x460/0x460 [ 145.972315][ T8393] ? page_fault+0x2f/0x40 [ 145.976626][ T8393] ? __rcu_read_lock+0x50/0x50 [ 145.981365][ T8393] ? __se_sys_io_submit+0x90/0x380 [ 145.986458][ T8393] ? lookup_ioctx+0x26e/0x460 [ 145.991117][ T8393] ? security_file_permission+0x128/0x300 [ 145.996813][ T8393] __se_sys_io_submit+0x169/0x380 [ 146.001813][ T8393] ? fput_many+0x42/0x1a0 [ 146.006121][ T8393] ? __x64_sys_io_submit+0x80/0x80 [ 146.011206][ T8393] ? ksys_write+0x237/0x2a0 [ 146.015699][ T8393] ? __ia32_sys_read+0x80/0x80 [ 146.020449][ T8393] ? fput_many+0x42/0x1a0 [ 146.024762][ T8393] do_syscall_64+0xcb/0x150 [ 146.029263][ T8393] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.035130][ T8393] RIP: 0033:0x45de89 [ 146.039004][ T8393] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.058595][ T8393] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 146.066983][ T8393] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 146.074948][ T8393] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 146.082910][ T8393] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 146.090859][ T8393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 146.098810][ T8393] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:05 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) 01:05:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x81ffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 146.201707][ T8405] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 146.217201][ T8409] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:05 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:05 executing program 0 (fault-call:11 fault-nth:35): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x8e000000, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:05 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) 01:05:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, 0x0, 0x200, 0x270bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4048085}, 0x4801) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e1}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000140)="0200000003ffffffe200008657ba8d00000000000000000f002e69fc3e2a57476141009f64224036233966daff02007a2f435d09cb00"/70, 0x46, 0x1000}, {&(0x7f0000000100)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f00000002c0)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x47fc}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xe00000000}], 0x358cc0, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYRESHEX, @ANYRESOCT=0x0]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f00000005c0)={'raw\x00'}, &(0x7f0000000640)=0x54) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_VENDOR(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6b}, @val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, r6, 0x1, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xe6f9, 0x64}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x55}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x40901) 01:05:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x9effffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 146.431815][ T8423] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 146.443818][ T8422] FAULT_INJECTION: forcing a failure. [ 146.443818][ T8422] name failslab, interval 1, probability 0, space 0, times 0 [ 146.457902][ T8422] CPU: 1 PID: 8422 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 146.467960][ T8422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.478003][ T8422] Call Trace: [ 146.481299][ T8422] dump_stack+0x1b0/0x21e [ 146.485612][ T8422] ? devkmsg_release+0x11c/0x11c [ 146.490531][ T8422] ? find_get_entry+0x5da/0x670 [ 146.495518][ T8422] ? show_regs_print_info+0x12/0x12 [ 146.500697][ T8422] ? page_cache_prev_miss+0x3e0/0x3e0 [ 146.506227][ T8422] should_fail+0x6fb/0x860 [ 146.510629][ T8422] ? setup_fault_attr+0x2b0/0x2b0 [ 146.515752][ T8422] ? _raw_spin_lock+0xa1/0x170 [ 146.520502][ T8422] ? _raw_spin_trylock_bh+0x190/0x190 [ 146.525895][ T8422] ? is_mmconf_reserved+0x420/0x420 [ 146.531083][ T8422] ? mempool_alloc_slab+0x16/0x30 [ 146.536141][ T8422] ? mempool_free+0x380/0x380 [ 146.540996][ T8422] should_failslab+0x5/0x20 [ 146.545517][ T8422] kmem_cache_alloc+0x36/0x250 [ 146.550487][ T8422] ? mempool_free+0x380/0x380 [ 146.555157][ T8422] mempool_alloc_slab+0x16/0x30 [ 146.560116][ T8422] mempool_alloc+0x100/0x650 [ 146.564728][ T8422] ? write_boundary_block+0x150/0x150 [ 146.570122][ T8422] ? xas_find_marked+0x95e/0xa10 [ 146.575139][ T8422] ? __rcu_read_lock+0x50/0x50 [ 146.579889][ T8422] ? mempool_resize+0x910/0x910 [ 146.584731][ T8422] ? __getblk_gfp+0x3a/0x750 [ 146.589363][ T8422] bio_alloc_bioset+0x1fc/0x660 [ 146.594247][ T8422] ? __ext4_get_inode_loc+0x499/0x1030 [ 146.599692][ T8422] ? bio_chain_endio+0xf0/0xf0 [ 146.604639][ T8422] submit_bh_wbc+0x1ba/0x790 [ 146.609214][ T8422] ? ext4_get_inode_loc+0x60/0x60 [ 146.614231][ T8422] ? pagevec_lookup_range_tag+0x37/0x80 [ 146.619817][ T8422] ? __filemap_fdatawait_range+0x2c3/0x350 [ 146.625673][ T8422] __sync_dirty_buffer+0x1d2/0x2d0 [ 146.630769][ T8422] ext4_write_inode+0x3b1/0x640 [ 146.635606][ T8422] ? __ext4_iget+0x48a0/0x48a0 [ 146.640352][ T8422] ? _raw_spin_lock+0xa1/0x170 [ 146.645250][ T8422] ? _raw_spin_trylock_bh+0x190/0x190 [ 146.650739][ T8422] write_inode+0x101/0x390 [ 146.655231][ T8422] __writeback_single_inode+0x611/0x820 [ 146.660889][ T8422] writeback_single_inode+0x211/0x770 [ 146.666269][ T8422] ? write_inode_now+0x330/0x330 [ 146.671201][ T8422] ? _raw_spin_unlock+0x5/0x20 [ 146.675950][ T8422] ? sync_mapping_buffers+0xe11/0xe80 [ 146.681306][ T8422] sync_inode_metadata+0xe6/0x170 [ 146.686399][ T8422] ? emergency_thaw_bdev+0xc0/0xc0 [ 146.691495][ T8422] ? sync_inode+0x20/0x20 [ 146.695813][ T8422] ? __rcu_read_lock+0x50/0x50 [ 146.700791][ T8422] ? dput+0x4ed/0x5e0 [ 146.704817][ T8422] ? dget_parent+0xb1/0x280 [ 146.709311][ T8422] ext4_sync_file+0x81b/0xc80 [ 146.714314][ T8422] ext4_file_write_iter+0xa96/0x1250 [ 146.719584][ T8422] ? ext4_file_read_iter+0x140/0x140 [ 146.724858][ T8422] ? avc_policy_seqno+0x17/0x70 [ 146.729878][ T8422] ? selinux_file_permission+0x2d0/0x520 [ 146.735728][ T8422] ? security_file_permission+0x128/0x300 [ 146.741436][ T8422] aio_write+0x45d/0x5f0 [ 146.746146][ T8422] ? aio_read+0x4a0/0x4a0 [ 146.750552][ T8422] ? __fget+0x37c/0x3c0 [ 146.755123][ T8422] ? setup_fault_attr+0x2b0/0x2b0 [ 146.760450][ T8422] ? fget_many+0x20/0x20 [ 146.764860][ T8422] ? io_submit_one+0x158/0x2370 [ 146.769845][ T8422] ? kmem_cache_alloc+0x1d5/0x250 [ 146.775001][ T8422] io_submit_one+0xa21/0x2370 [ 146.780079][ T8422] ? lookup_ioctx+0x460/0x460 [ 146.784842][ T8422] ? page_fault+0x2f/0x40 [ 146.789164][ T8422] ? __rcu_read_lock+0x50/0x50 [ 146.793912][ T8422] ? __se_sys_io_submit+0x90/0x380 [ 146.799052][ T8422] ? lookup_ioctx+0x26e/0x460 [ 146.803891][ T8422] ? security_file_permission+0x128/0x300 [ 146.809947][ T8422] __se_sys_io_submit+0x169/0x380 [ 146.815015][ T8422] ? fput_many+0x42/0x1a0 [ 146.819343][ T8422] ? __x64_sys_io_submit+0x80/0x80 [ 146.824649][ T8422] ? ksys_write+0x237/0x2a0 [ 146.829165][ T8422] ? __ia32_sys_read+0x80/0x80 [ 146.834191][ T8422] ? fput_many+0x42/0x1a0 [ 146.838655][ T8422] do_syscall_64+0xcb/0x150 [ 146.843443][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.849489][ T8422] RIP: 0033:0x45de89 [ 146.853521][ T8422] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.873925][ T8422] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 01:05:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 146.882737][ T8422] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 146.890931][ T8422] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 146.899168][ T8422] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 146.907471][ T8422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 146.915448][ T8422] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0/file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000000002000019000000900100000f001f00000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203a1d827569da5fd44a7ac3976a34ac75d96c40e66f929b193149f699b669a4eb05abf49e4993f2785b3a52f1dba26dad9b307e37b6f5ef418cd2219c4bf9b87a8db", 0xa7, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f00000000c0)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socket(0x1e, 0x80000, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfd, {0xd, 0xd, './file0/file0', './file0/file0'}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 01:05:06 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x3000}]) 01:05:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xc3ffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:06 executing program 0 (fault-call:11 fault-nth:36): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 147.037264][ T8440] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 147.070317][ T8456] FAULT_INJECTION: forcing a failure. [ 147.070317][ T8456] name failslab, interval 1, probability 0, space 0, times 0 [ 147.083670][ T8456] CPU: 0 PID: 8456 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 147.094497][ T8456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.104670][ T8456] Call Trace: [ 147.108104][ T8456] dump_stack+0x1b0/0x21e [ 147.112540][ T8456] ? devkmsg_release+0x11c/0x11c [ 147.117528][ T8456] ? show_regs_print_info+0x12/0x12 [ 147.122731][ T8456] ? prepare_to_wait+0x20b/0x270 [ 147.128046][ T8456] should_fail+0x6fb/0x860 [ 147.132651][ T8456] ? setup_fault_attr+0x2b0/0x2b0 [ 147.137938][ T8456] ? __wait_on_bit+0x177/0x190 [ 147.143289][ T8456] ? bit_wait+0x90/0x90 [ 147.147600][ T8456] ? mempool_alloc_slab+0x16/0x30 [ 147.152758][ T8456] ? mempool_free+0x380/0x380 [ 147.157550][ T8456] should_failslab+0x5/0x20 [ 147.162141][ T8456] kmem_cache_alloc+0x36/0x250 [ 147.167161][ T8456] ? bit_wait+0x90/0x90 [ 147.171758][ T8456] ? mempool_free+0x380/0x380 [ 147.176578][ T8456] mempool_alloc_slab+0x16/0x30 [ 147.181795][ T8456] mempool_alloc+0x100/0x650 [ 147.186532][ T8456] ? mempool_resize+0x910/0x910 [ 147.191729][ T8456] ? __brelse+0x54/0x90 [ 147.195952][ T8456] ? ext4_write_inode+0x493/0x640 [ 147.200968][ T8456] ? __ext4_iget+0x48a0/0x48a0 [ 147.206060][ T8456] bio_alloc_bioset+0x1fc/0x660 [ 147.211163][ T8456] ? bio_chain_endio+0xf0/0xf0 [ 147.216020][ T8456] ? _raw_spin_lock+0xa1/0x170 [ 147.220875][ T8456] submit_bh_wbc+0x1ba/0x790 [ 147.225636][ T8456] ? writeback_single_inode+0x5e0/0x770 [ 147.231300][ T8456] sync_mapping_buffers+0x56d/0xe80 [ 147.236679][ T8456] ? lockref_put_return+0x1e7/0x290 [ 147.242377][ T8456] ? emergency_thaw_bdev+0xc0/0xc0 [ 147.247477][ T8456] ? __rcu_read_lock+0x50/0x50 [ 147.252777][ T8456] ? __rcu_read_lock+0x50/0x50 [ 147.258059][ T8456] ? dput+0x4ed/0x5e0 [ 147.263044][ T8456] ? dget_parent+0xb1/0x280 [ 147.267835][ T8456] ext4_sync_file+0x7fb/0xc80 [ 147.272983][ T8456] ext4_file_write_iter+0xa96/0x1250 [ 147.278723][ T8456] ? ext4_file_read_iter+0x140/0x140 [ 147.284202][ T8456] ? avc_policy_seqno+0x17/0x70 [ 147.289130][ T8456] ? selinux_file_permission+0x2d0/0x520 [ 147.295006][ T8456] ? security_file_permission+0x128/0x300 [ 147.301381][ T8456] aio_write+0x45d/0x5f0 [ 147.305626][ T8456] ? aio_read+0x4a0/0x4a0 [ 147.310093][ T8456] ? __fget+0x37c/0x3c0 [ 147.314413][ T8456] ? setup_fault_attr+0x2b0/0x2b0 [ 147.319489][ T8456] ? fget_many+0x20/0x20 [ 147.324104][ T8456] ? io_submit_one+0x158/0x2370 [ 147.329653][ T8456] ? kmem_cache_alloc+0x1d5/0x250 [ 147.334756][ T8456] io_submit_one+0xa21/0x2370 [ 147.339771][ T8456] ? lookup_ioctx+0x460/0x460 [ 147.346584][ T8456] ? page_fault+0x2f/0x40 [ 147.351025][ T8456] ? __rcu_read_lock+0x50/0x50 [ 147.356354][ T8456] ? __se_sys_io_submit+0x90/0x380 [ 147.361756][ T8456] ? lookup_ioctx+0x26e/0x460 [ 147.366421][ T8456] ? security_file_permission+0x128/0x300 [ 147.372740][ T8456] __se_sys_io_submit+0x169/0x380 [ 147.378204][ T8456] ? fput_many+0x42/0x1a0 [ 147.382797][ T8456] ? __x64_sys_io_submit+0x80/0x80 [ 147.388692][ T8456] ? ksys_write+0x237/0x2a0 [ 147.393231][ T8456] ? __ia32_sys_read+0x80/0x80 [ 147.398328][ T8456] ? fput_many+0x42/0x1a0 [ 147.402641][ T8456] do_syscall_64+0xcb/0x150 [ 147.407134][ T8456] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 147.413117][ T8456] RIP: 0033:0x45de89 [ 147.417007][ T8456] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:05:06 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r1 = signalfd(r0, &(0x7f0000000080), 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000002, 0x10, r1, 0x8000000) syz_io_uring_complete(r3) r4 = dup(r2) write$P9_RLERROR(r4, &(0x7f0000000180)={0x16, 0x7, 0x2, {0xd, 'security.ima\x00'}}, 0x16) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000000c0)='+$-/&#.$\x00', &(0x7f0000000140)='./file0/file0\x00', r4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netfilter\x00') lseek(r5, 0x1ffffffffd, 0x0) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:06 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xeaffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:06 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, 0x0}]) 01:05:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 147.437492][ T8456] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 147.446470][ T8456] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 147.455012][ T8456] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 147.463561][ T8456] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 147.471523][ T8456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 147.479674][ T8456] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xefffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:06 executing program 0 (fault-call:11 fault-nth:37): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xf0ffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:06 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, 0x0}]) 01:05:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xfcffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 147.564076][ T8465] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 147.586633][ T8480] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) 01:05:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x800004e0}, {&(0x7f0000000140)="0331e333ef8856e883274e37039cf1471a631c97545b037e39431fb67b7fa4e37dd132474c06ce567ca5f2708f097769dacd6348081eeaa7fb9a43fc35f8d0048530d84153209671bf6ba2f3fd828f2a4553218aca21eb09b84544dd0ff08b8f2c830c0aa4771443cf27bbd13f3ef4f6fbf08e69389add73426cc42c581da0fd818a0c3aeaab61e1", 0x88, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc00000803a00000600"/21, 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) [ 147.621507][ T8478] FAULT_INJECTION: forcing a failure. [ 147.621507][ T8478] name failslab, interval 1, probability 0, space 0, times 0 [ 147.635144][ T8478] CPU: 0 PID: 8478 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 147.645470][ T8478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.655979][ T8478] Call Trace: [ 147.659415][ T8478] dump_stack+0x1b0/0x21e [ 147.663744][ T8478] ? devkmsg_release+0x11c/0x11c [ 147.668848][ T8478] ? show_regs_print_info+0x12/0x12 [ 147.674053][ T8478] ? is_mmconf_reserved+0x420/0x420 [ 147.679254][ T8478] should_fail+0x6fb/0x860 [ 147.683848][ T8478] ? setup_fault_attr+0x2b0/0x2b0 [ 147.688990][ T8478] ? schedule+0x13b/0x1d0 [ 147.693811][ T8478] ? io_schedule+0x86/0xf0 [ 147.698228][ T8478] ? mempool_alloc_slab+0x16/0x30 [ 147.703334][ T8478] ? mempool_free+0x380/0x380 [ 147.708226][ T8478] should_failslab+0x5/0x20 [ 147.713095][ T8478] kmem_cache_alloc+0x36/0x250 [ 147.717942][ T8478] ? mempool_free+0x380/0x380 [ 147.722622][ T8478] mempool_alloc_slab+0x16/0x30 [ 147.727994][ T8478] mempool_alloc+0x100/0x650 [ 147.732691][ T8478] ? _raw_spin_unlock+0x5/0x20 [ 147.738306][ T8478] ? writeback_single_inode+0x5e0/0x770 [ 147.744161][ T8478] ? mempool_resize+0x910/0x910 [ 147.749099][ T8478] ? write_inode_now+0x330/0x330 [ 147.754169][ T8478] ? _raw_spin_unlock+0x5/0x20 [ 147.758930][ T8478] ? sync_mapping_buffers+0xe11/0xe80 [ 147.764416][ T8478] bio_alloc_bioset+0x1fc/0x660 [ 147.769756][ T8478] ? lockref_put_return+0x1e7/0x290 [ 147.775160][ T8478] ? bio_chain_endio+0xf0/0xf0 [ 147.780093][ T8478] ? sync_inode+0x20/0x20 [ 147.784420][ T8478] blkdev_issue_flush+0xc6/0x300 [ 147.789353][ T8478] ? dput+0x4ed/0x5e0 [ 147.793655][ T8478] ? dget_parent+0xb1/0x280 [ 147.798243][ T8478] ext4_sync_file+0x67d/0xc80 [ 147.802923][ T8478] ext4_file_write_iter+0xa96/0x1250 [ 147.808613][ T8478] ? ext4_file_read_iter+0x140/0x140 [ 147.814066][ T8478] ? avc_policy_seqno+0x17/0x70 [ 147.819556][ T8478] ? selinux_file_permission+0x2d0/0x520 [ 147.825551][ T8478] ? security_file_permission+0x128/0x300 [ 147.831591][ T8478] aio_write+0x45d/0x5f0 [ 147.835942][ T8478] ? aio_read+0x4a0/0x4a0 [ 147.840709][ T8478] ? __fget+0x37c/0x3c0 [ 147.845219][ T8478] ? setup_fault_attr+0x2b0/0x2b0 [ 147.850246][ T8478] ? fget_many+0x20/0x20 [ 147.854483][ T8478] ? io_submit_one+0x158/0x2370 [ 147.859488][ T8478] ? kmem_cache_alloc+0x1d5/0x250 [ 147.864573][ T8478] io_submit_one+0xa21/0x2370 [ 147.869342][ T8478] ? lookup_ioctx+0x460/0x460 [ 147.874177][ T8478] ? page_fault+0x2f/0x40 [ 147.878850][ T8478] ? __rcu_read_lock+0x50/0x50 [ 147.883698][ T8478] ? __se_sys_io_submit+0x90/0x380 [ 147.888941][ T8478] ? lookup_ioctx+0x26e/0x460 [ 147.893716][ T8478] ? security_file_permission+0x128/0x300 [ 147.899432][ T8478] __se_sys_io_submit+0x169/0x380 [ 147.904640][ T8478] ? fput_many+0x42/0x1a0 [ 147.909187][ T8478] ? __x64_sys_io_submit+0x80/0x80 [ 147.914449][ T8478] ? ksys_write+0x237/0x2a0 [ 147.919014][ T8478] ? __ia32_sys_read+0x80/0x80 [ 147.923775][ T8478] ? fput_many+0x42/0x1a0 [ 147.928422][ T8478] do_syscall_64+0xcb/0x150 [ 147.933208][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 147.939494][ T8478] RIP: 0033:0x45de89 [ 147.943488][ T8478] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 147.963373][ T8478] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 01:05:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xfeffffff, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 147.971873][ T8478] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 147.980020][ T8478] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 147.988418][ T8478] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 147.996655][ T8478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 148.004929][ T8478] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c [ 148.035109][ T8492] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 148.091659][ T8499] EXT4-fs (loop1): unsupported descriptor size 0 01:05:07 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, 0x0}]) 01:05:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xffffff7f, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:07 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:07 executing program 0 (fault-call:11 fault-nth:38): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x60100, 0x10) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xffffff81, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 148.431277][ T8504] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 148.448561][ T8513] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 148.468797][ T8518] FAULT_INJECTION: forcing a failure. [ 148.468797][ T8518] name failslab, interval 1, probability 0, space 0, times 0 [ 148.481937][ T8518] CPU: 0 PID: 8518 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 148.492793][ T8518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.503624][ T8518] Call Trace: [ 148.507013][ T8518] dump_stack+0x1b0/0x21e [ 148.511540][ T8518] ? devkmsg_release+0x11c/0x11c [ 148.516968][ T8518] ? show_regs_print_info+0x12/0x12 [ 148.522398][ T8518] ? prepare_to_wait+0x20b/0x270 [ 148.527454][ T8518] should_fail+0x6fb/0x860 [ 148.531862][ T8518] ? setup_fault_attr+0x2b0/0x2b0 [ 148.536952][ T8518] ? __wait_on_bit+0x177/0x190 [ 148.541711][ T8518] ? bit_wait+0x90/0x90 [ 148.546014][ T8518] ? mempool_alloc_slab+0x16/0x30 [ 148.551035][ T8518] ? mempool_free+0x380/0x380 [ 148.555704][ T8518] should_failslab+0x5/0x20 [ 148.560229][ T8518] kmem_cache_alloc+0x36/0x250 [ 148.564990][ T8518] ? bit_wait+0x90/0x90 [ 148.569427][ T8518] ? mempool_free+0x380/0x380 [ 148.574104][ T8518] mempool_alloc_slab+0x16/0x30 [ 148.579028][ T8518] mempool_alloc+0x100/0x650 [ 148.584648][ T8518] ? mempool_resize+0x910/0x910 [ 148.589583][ T8518] ? __brelse+0x54/0x90 [ 148.593894][ T8518] ? ext4_write_inode+0x493/0x640 [ 148.599373][ T8518] ? __ext4_iget+0x48a0/0x48a0 [ 148.604562][ T8518] bio_alloc_bioset+0x1fc/0x660 [ 148.609847][ T8518] ? bio_chain_endio+0xf0/0xf0 [ 148.614693][ T8518] ? _raw_spin_lock+0xa1/0x170 [ 148.619544][ T8518] submit_bh_wbc+0x1ba/0x790 [ 148.624200][ T8518] ? writeback_single_inode+0x5e0/0x770 [ 148.630214][ T8518] sync_mapping_buffers+0x56d/0xe80 [ 148.635518][ T8518] ? lockref_put_return+0x1e7/0x290 [ 148.640712][ T8518] ? emergency_thaw_bdev+0xc0/0xc0 [ 148.645965][ T8518] ? __rcu_read_lock+0x50/0x50 [ 148.650803][ T8518] ? __rcu_read_lock+0x50/0x50 [ 148.655709][ T8518] ? dput+0x4ed/0x5e0 [ 148.659821][ T8518] ? dget_parent+0xb1/0x280 [ 148.664393][ T8518] ext4_sync_file+0x7fb/0xc80 [ 148.669206][ T8518] ext4_file_write_iter+0xa96/0x1250 [ 148.674574][ T8518] ? ext4_file_read_iter+0x140/0x140 [ 148.679854][ T8518] ? avc_policy_seqno+0x17/0x70 [ 148.684703][ T8518] ? selinux_file_permission+0x2d0/0x520 [ 148.690330][ T8518] ? security_file_permission+0x128/0x300 [ 148.696764][ T8518] aio_write+0x45d/0x5f0 [ 148.701004][ T8518] ? aio_read+0x4a0/0x4a0 [ 148.705526][ T8518] ? __fget+0x37c/0x3c0 [ 148.709684][ T8518] ? setup_fault_attr+0x2b0/0x2b0 [ 148.714706][ T8518] ? fget_many+0x20/0x20 [ 148.719230][ T8518] ? io_submit_one+0x158/0x2370 [ 148.724228][ T8518] ? kmem_cache_alloc+0x1d5/0x250 [ 148.729580][ T8518] io_submit_one+0xa21/0x2370 [ 148.734737][ T8518] ? lookup_ioctx+0x460/0x460 [ 148.739412][ T8518] ? page_fault+0x2f/0x40 [ 148.743767][ T8518] ? __rcu_read_lock+0x50/0x50 [ 148.748638][ T8518] ? __se_sys_io_submit+0x90/0x380 [ 148.753885][ T8518] ? lookup_ioctx+0x26e/0x460 [ 148.758785][ T8518] ? security_file_permission+0x128/0x300 [ 148.764763][ T8518] __se_sys_io_submit+0x169/0x380 [ 148.770013][ T8518] ? fput_many+0x42/0x1a0 [ 148.774500][ T8518] ? __x64_sys_io_submit+0x80/0x80 [ 148.780823][ T8518] ? ksys_write+0x237/0x2a0 [ 148.785328][ T8518] ? __ia32_sys_read+0x80/0x80 [ 148.790284][ T8518] ? fput_many+0x42/0x1a0 [ 148.794610][ T8518] do_syscall_64+0xcb/0x150 [ 148.799172][ T8518] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 148.805250][ T8518] RIP: 0033:0x45de89 [ 148.809231][ T8518] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:05:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) [ 148.829855][ T8518] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 148.838691][ T8518] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 148.846968][ T8518] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 148.855175][ T8518] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 148.863438][ T8518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 148.871488][ T8518] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x4, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xffffff9e, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:08 executing program 0 (fault-call:11 fault-nth:39): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xffffffc3, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 148.958381][ T8529] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 148.968094][ T8528] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 148.987197][ T8534] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 149.020748][ T8542] FAULT_INJECTION: forcing a failure. [ 149.020748][ T8542] name failslab, interval 1, probability 0, space 0, times 0 [ 149.046168][ T8542] CPU: 1 PID: 8542 Comm: syz-executor.0 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 149.057249][ T8542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.067777][ T8542] Call Trace: [ 149.071186][ T8542] dump_stack+0x1b0/0x21e [ 149.075657][ T8542] ? devkmsg_release+0x11c/0x11c [ 149.080670][ T8542] ? show_regs_print_info+0x12/0x12 [ 149.085857][ T8542] ? is_mmconf_reserved+0x420/0x420 [ 149.091907][ T8542] should_fail+0x6fb/0x860 [ 149.096502][ T8542] ? setup_fault_attr+0x2b0/0x2b0 [ 149.101603][ T8542] ? schedule+0x13b/0x1d0 [ 149.106171][ T8542] ? io_schedule+0x86/0xf0 [ 149.110891][ T8542] ? mempool_alloc_slab+0x16/0x30 [ 149.116563][ T8542] ? mempool_free+0x380/0x380 [ 149.121256][ T8542] should_failslab+0x5/0x20 [ 149.125964][ T8542] kmem_cache_alloc+0x36/0x250 [ 149.131024][ T8542] ? mempool_free+0x380/0x380 [ 149.135832][ T8542] mempool_alloc_slab+0x16/0x30 [ 149.140818][ T8542] mempool_alloc+0x100/0x650 [ 149.145628][ T8542] ? _raw_spin_unlock+0x5/0x20 [ 149.150644][ T8542] ? writeback_single_inode+0x5e0/0x770 [ 149.156310][ T8542] ? mempool_resize+0x910/0x910 [ 149.161151][ T8542] ? write_inode_now+0x330/0x330 [ 149.166433][ T8542] ? _raw_spin_unlock+0x5/0x20 [ 149.171388][ T8542] ? sync_mapping_buffers+0xe11/0xe80 [ 149.176885][ T8542] bio_alloc_bioset+0x1fc/0x660 [ 149.182060][ T8542] ? lockref_put_return+0x1e7/0x290 [ 149.187418][ T8542] ? bio_chain_endio+0xf0/0xf0 [ 149.192448][ T8542] ? sync_inode+0x20/0x20 [ 149.196942][ T8542] blkdev_issue_flush+0xc6/0x300 [ 149.202101][ T8542] ? dput+0x4ed/0x5e0 [ 149.206088][ T8542] ? dget_parent+0xb1/0x280 [ 149.210821][ T8542] ext4_sync_file+0x67d/0xc80 [ 149.216121][ T8542] ext4_file_write_iter+0xa96/0x1250 [ 149.221568][ T8542] ? ext4_file_read_iter+0x140/0x140 [ 149.227284][ T8542] ? avc_policy_seqno+0x17/0x70 [ 149.234266][ T8542] ? selinux_file_permission+0x2d0/0x520 [ 149.240163][ T8542] ? security_file_permission+0x128/0x300 [ 149.246118][ T8542] aio_write+0x45d/0x5f0 [ 149.250550][ T8542] ? aio_read+0x4a0/0x4a0 [ 149.255337][ T8542] ? __fget+0x37c/0x3c0 [ 149.259800][ T8542] ? setup_fault_attr+0x2b0/0x2b0 [ 149.264876][ T8542] ? fget_many+0x20/0x20 [ 149.269186][ T8542] ? io_submit_one+0x158/0x2370 [ 149.274226][ T8542] ? kmem_cache_alloc+0x1d5/0x250 [ 149.279377][ T8542] io_submit_one+0xa21/0x2370 [ 149.284175][ T8542] ? lookup_ioctx+0x460/0x460 [ 149.289071][ T8542] ? page_fault+0x2f/0x40 [ 149.293672][ T8542] ? __rcu_read_lock+0x50/0x50 [ 149.299138][ T8542] ? __se_sys_io_submit+0x90/0x380 [ 149.304387][ T8542] ? lookup_ioctx+0x26e/0x460 [ 149.309462][ T8542] ? security_file_permission+0x128/0x300 [ 149.315682][ T8542] __se_sys_io_submit+0x169/0x380 [ 149.321169][ T8542] ? fput_many+0x42/0x1a0 [ 149.325817][ T8542] ? __x64_sys_io_submit+0x80/0x80 [ 149.331081][ T8542] ? ksys_write+0x237/0x2a0 [ 149.335602][ T8542] ? __ia32_sys_read+0x80/0x80 [ 149.340824][ T8542] ? fput_many+0x42/0x1a0 [ 149.345263][ T8542] do_syscall_64+0xcb/0x150 [ 149.349881][ T8542] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 149.355759][ T8542] RIP: 0033:0x45de89 [ 149.359887][ T8542] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.380422][ T8542] RSP: 002b:00007f28a6e55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 149.389171][ T8542] RAX: ffffffffffffffda RBX: 0000000000008280 RCX: 000000000045de89 [ 149.397148][ T8542] RDX: 0000000020000540 RSI: 0000000000000006 RDI: 00007f28a6e33000 [ 149.405706][ T8542] RBP: 00007f28a6e55ca0 R08: 0000000000000000 R09: 0000000000000000 [ 149.413939][ T8542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 01:05:08 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, &(0x7f0000000080)) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xffffffea, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:08 executing program 1: prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffc000/0x3000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast2}, &(0x7f00000000c0)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x400, 0x1000, 0x7f, 0x4}, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000dd2071fc720345659c1684ba384fae9ab5706381d3433da80cb23faa6aeae387391b418e54", @ANYRES16=0x0, @ANYBLOB="040029bd7000fcdbdf250500000005003800000000000800310005000000050038000100000005002d00010000000600280002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4004010}, 0x4000) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) 01:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xffffffef, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 149.422123][ T8542] R13: 00007fffb6c685ff R14: 00007f28a6e569c0 R15: 000000000118bf2c 01:05:08 executing program 0 (fault-call:11 fault-nth:40): r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xfffffff0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) [ 149.523397][ T8549] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 149.549351][ T8555] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xfffffffc, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'security.', 'security.ima\x00'}) [ 149.579018][ T8566] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 149.610726][ T8574] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 149.684172][ T8580] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 149.712006][ T8584] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 149.729931][ T8588] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:09 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, &(0x7f0000000080)) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0xfffffffe, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:09 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4c4140, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@initdev, 0x0}, &(0x7f00000002c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'syztnl2\x00', r1, 0x2f, 0x9e, 0x0, 0x9, 0x4, @empty, @dev={0xfe, 0x80, [], 0x1f}, 0x40, 0x10, 0x200, 0x6}}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 150.407545][ T8599] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 150.433302][ T8607] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 150.436414][ T8606] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:09 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r0 = getuid() setreuid(0xee00, r0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x2, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 150.598566][ T8619] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 150.618365][ T8628] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 150.655398][ T8639] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:10 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, &(0x7f0000000080)) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:10 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x7, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x3, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:10 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)=[&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='{', &(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)='&f!{\x00', &(0x7f0000000340)=',\x00', &(0x7f0000000380)='$\x00', &(0x7f00000003c0)='.\x00', &(0x7f0000000400)='security.ima\x00'], &(0x7f00000006c0)=[&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='\x87\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)=':[\x00', &(0x7f0000000640)='\\\x00', &(0x7f0000000680)='\x00'], 0x800) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x4, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x5, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:10 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0xffffffffffffffce}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x32328a2, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000040)={0x7ff, {0xc, 0x2, 0xfffffffffffffffb, 0x576, 0x6}}) lchown(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0xee00) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea055349d2ad0ab27300000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ed00e4e209000000ff0000000100000008000000052f21a113e7fbf8ba3cbb8cce39214306ded677c04c14713a8c9a1dd47771c2213b230535b2eb6d7a215f691dd9c82cc64a9ea1c8e09ecd82d37ebbf141341b11bb55bded016dbf96378c9fed35935cb8d1d5d16e87a2f2e6902405b34c176e3c3dce503f31f7843d4d4166980e31132f25f165c7bd2b94350fb322da1bc346f685869dfe132c4da3f07612fb7eca2cb82f9bcc31faf7f1e320131e7b006522d775c34c458c923566dca330b9ffd4c674c43177300827d5b6ab35a9d152dd208fa6de8236e37bf6a77931bd0b38de78ac4f542064baa7a763e5932a3aa81f6d3611fd31"], 0x205) [ 151.302140][ T8653] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 151.304963][ T8655] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 151.323321][ T8656] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x8, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 151.459809][ T8676] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 151.473705][ T8679] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x60, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:11 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0xe0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:11 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e1}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0xbc6}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) prctl$PR_GET_SECUREBITS(0x1b) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="05562998a8000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030001000000080001007063690011000200303030303a30303a31302e30000000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030002000000"], 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x8e, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x300, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:11 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x17f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 152.296022][ T8707] EXT4-fs (loop1): unsupported descriptor size 16384 [ 152.309533][ T8705] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:11 executing program 3: setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x500, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:11 executing program 3: setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 152.442092][ T8707] EXT4-fs (loop1): unsupported descriptor size 16384 01:05:12 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:12 executing program 3: setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x4000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0xff}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="311fc076554140", 0x7, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2, {0x0, @empty}}, 0x1e) io_setup(0x7, &(0x7f0000000080)) socketpair(0x18, 0x6, 0xdd54, &(0x7f00000007c0)={0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x4, 0x338, 0xffffffff, 0x0, 0x198, 0x0, 0xffffffff, 0xffffffff, 0x2a0, 0x2a0, 0x2a0, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ip={@multicast1, @multicast2, 0xff, 0xff, 'dummy0\x00', 'erspan0\x00', {0xff}, {0xff}, 0x62, 0x3, 0x52}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0xc33c2eb43334201b, 0x2, 0x3f}}}, {{@ip={@remote, @multicast1, 0x0, 0x0, 'wg0\x00', 'xfrm0\x00', {0xff}, {}, 0x2, 0x1, 0x7e}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x3, [0x4, 0x7, 0x5, 0x1, 0x7], 0x0, 0x1}}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xf, "9d12", 0x1}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0xffffffff, 'syzkaller0\x00', '\x00', {}, {0xff}, 0x73, 0x1}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x61, 0xc0, 0x1, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@rand_addr=' \x01\x00', 'veth1_vlan\x00', {0x6}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) get_robust_list(0xffffffffffffffff, &(0x7f0000000740)=&(0x7f0000000700)={&(0x7f0000000680)={&(0x7f00000001c0)}, 0x0, &(0x7f00000006c0)}, &(0x7f0000000780)=0x18) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r1) ioctl$EVIOCRMFF(r1, 0x4b47, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000800)={'ah\x00'}, &(0x7f0000000840)=0x1e) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup2(r1, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000880)={0x6c, @loopback, 0x4e21, 0x0, 'lc\x00', 0x18, 0x8000, 0x24}, 0x2c) 01:05:12 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x438, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x6000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x8100, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 153.098258][ T8752] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 153.098810][ T8751] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 153.133838][ T8751] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:12 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0xffe0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 153.454510][ T8779] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 01:05:13 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x8e00, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:13 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x7ff00, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x1000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:13 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x404}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0xa80804, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000140)={{r4, r5/1000+10000}, 0x0, 0x8, 0x1f}, 0x18) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x1040, &(0x7f00000002c0)=ANY=[@ANYBLOB="78696e6f3d6f6e2c78696e6f3d617574262ba8008164be6f08736d61636b66736861743d"]) r6 = dup3(r0, r2, 0x80000) sendmsg$IPVS_CMD_DEL_DAEMON(r6, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x2, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000080)=0x7fffffff) 01:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x2000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:13 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0xffffffe0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x3000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 154.045957][ T8803] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 01:05:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) [ 154.092237][ T8820] EXT4-fs (loop2): re-mounted. Opts: (null) [ 154.400346][ T8835] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 154.412278][ T8835] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:13 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x4000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:13 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0xffffffffffffffe0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000300)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000100000000000000040002000000000008000400", @ANYRES32=r2, @ANYBLOB="7414f24b", @ANYRES32=0xee01, @ANYBLOB="10000500000000002000050000000000"], 0x34, 0x3) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x5000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 154.825216][ T8847] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:14 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000010, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0xaaaaaaaaaaaab31, &(0x7f0000000080), 0xa100a0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x4b47, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x40500, 0x0) r2 = openat(r1, &(0x7f00000001c0)='./file0\x00', 0x101000, 0x100) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) sendmsg$sock(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000240)="96848bf87893475213358e37b0", 0xd}, {&(0x7f0000000380)="213891fddf18315bc4f433495d8f3c61541b1072bf2256e80c6cc33f6578bbe3aba8a645c04cbbdfa71f1055ab9a77ea58283576d4119db95274ba2fcb653065e1bfa35d6f0ffb3629d0461ba2ffc8d204f4f806d2b9c61f64ab5adfdfae3025911782cfc170a05de39e9f9a6dd635f9c6c2a3914090cdf7aca9e4d92b73d52c7a8f3beacae8a8cd167c6ad68ba29f688ada537e8c7c59a59cd3a683806347f018c3575a66b75f60817ec797314d60cca258f2e9cb095dd3bb076b4f9e72309f", 0xc0}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000280)="a4db3cca8f8f68dc964c50427f4686ff08865d83beb437342537b858e7ba01a1c5c7bb703f07c37508671fee1effbce63c6fea8b4ed1813b", 0x38}, {&(0x7f0000001440)="111fbf6fd4eb4e1ebb127de19af187a14c1e61aac838c951797129b576a9abdc2b748278d1071d8a3a18cb589faca3ee6f6c584c93733e8788a994701e5f889d6c0c136fcc081aea9b795c0b03e23dfe7769a5810a91153eaf48bc749cd208001551e6c5761328b089a91e19c6fedd476dd740", 0x73}], 0x5}, 0x8885) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) 01:05:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x8000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 154.912183][ T8853] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 154.929692][ T8853] EXT4-fs (loop2): re-mounted. Opts: (null) [ 155.090286][ T8883] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 155.109682][ T8883] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:14 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x40000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:14 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x27030000000000f0, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x60000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x81000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 155.715534][ T8895] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 155.745213][ T8902] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) [ 155.755300][ T8895] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 155.890294][ T8916] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) [ 155.901697][ T8915] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 155.936585][ T8915] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x2, @remote, 0x4e23, 0x1, 'wlc\x00', 0x39, 0x3, 0x4}, 0x2c) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:15 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x270300000000fff0, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x81ffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:15 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x8e000000, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x9effffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 156.732452][ T8937] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) [ 156.752859][ T8932] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 156.765872][ T8934] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:15 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x27030000fffffff0, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x33}, @ldst={0x1, 0x2, 0x6, 0x4, 0x9, 0x2, 0x8}], &(0x7f00000002c0)='GPL\x00', 0xffffffe0, 0x88, &(0x7f0000000300)=""/136, 0x40f00, 0x3, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x10, 0x2, 0x9}, 0x10}, 0x78) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 01:05:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xc3ffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 156.785126][ T8932] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:16 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8000300, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xeaffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 156.897667][ T8960] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 156.909907][ T8960] EXT4-fs (loop2): re-mounted. Opts: (null) [ 156.925341][ T8967] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 156.975048][ T8967] EXT4-fs error (device loop1): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 156.994807][ T8967] Quota error (device loop1): write_blk: dquota write failed [ 157.005939][ T8967] Quota error (device loop1): write_blk: dquota write failed [ 157.014051][ T8967] Quota error (device loop1): qtree_write_dquot: Error -28 occurred while creating quota [ 157.024291][ T8981] Quota error (device loop1): write_blk: dquota write failed [ 157.032648][ T8981] Quota error (device loop1): qtree_write_dquot: Error -28 occurred while creating quota [ 157.046469][ T8981] Quota error (device loop1): write_blk: dquota write failed [ 157.055842][ T8981] Quota error (device loop1): qtree_write_dquot: Error -28 occurred while creating quota [ 157.066390][ T8967] Quota error (device loop1): write_blk: dquota write failed [ 157.074015][ T8967] Quota error (device loop1): qtree_write_dquot: Error -28 occurred while creating quota 01:05:16 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xefffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:16 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f02, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x4b47, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x3}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x11e}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a0900004006c4be1de1461403b044b5f13517fca14429208320f8b8271b3d90bc93a81cbf4f9deb4d167ed40d0e4b8f0bc042244791b43a0c66bdb5ffddc0a76689090e", 0x51, 0x30000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xf0ffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfcffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 157.593262][ T8994] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 157.620461][ T8997] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 157.625864][ T8994] EXT4-fs (loop3): mount failed [ 157.633027][ T8997] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:16 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f03, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfeffffff, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 157.735353][ T9018] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 157.752465][ T9022] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 157.766854][ T9018] EXT4-fs (loop2): re-mounted. Opts: (null) [ 157.784685][ T9022] EXT4-fs (loop3): mount failed [ 157.902755][ T8993] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:05:17 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xffffff7f, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:17 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f04, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 158.449093][ T9046] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 158.466422][ T9046] EXT4-fs (loop3): mount failed [ 158.473012][ T9048] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 158.492232][ T9048] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)='^\xb0\x00'}, 0x30) 01:05:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xffffff81, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:17 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f05, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xffffff9e, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:17 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f06, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 158.591384][ T9068] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 158.593139][ T9070] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 158.619013][ T9068] EXT4-fs (loop3): mount failed [ 158.626665][ T9080] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 158.703180][ T9090] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xffffffc3, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:18 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @empty}, &(0x7f0000000180)=0x10, 0x81800) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)={@private=0xa010102, @remote, 0x0, 0x1, [@broadcast]}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='xprtrdma_frwr_dereg\x00', r1}, 0x10) 01:05:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x32008a0, 0x0) 01:05:18 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f07, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xffffffea, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 159.309262][ T9100] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 159.331365][ T9104] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 159.344738][ T9103] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:05:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xffffffef, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 159.372113][ T9103] EXT4-fs (loop3): mount failed 01:05:18 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f08, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 159.402068][ T9123] EXT4-fs (loop2): re-mounted. Opts: (null) 01:05:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x32008a0, 0x0) 01:05:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfffffff0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x82) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x2, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000001) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r4, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x60}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x80000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x44041}, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r5, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x422}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}]}, 0x88}}, 0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x14, r5, 0x200}, 0x14}}, 0x804) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="6c00000024001d0600"/20, @ANYRES32=r6, @ANYBLOB="00000000f1ffffff"], 0x6c}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xec, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0xec}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x40, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0xffff}}]}, 0x40}, 0x1, 0x0, 0x0, 0x220000c0}, 0x8020) [ 159.518989][ T9128] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 159.520603][ T9133] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 159.542725][ T9128] EXT4-fs (loop3): mount failed [ 159.548933][ T9142] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 159.586540][ T9133] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 159.612619][ T9150] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9150 comm=syz-executor.1 01:05:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfffffffc, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:19 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:19 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f09, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x32008a0, 0x0) 01:05:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) lchown(&(0x7f0000000040)='./file0\x00', r0, r1) 01:05:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfffffffe, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:19 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0a, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 160.192572][ T9161] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 160.203719][ T9159] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 160.222556][ T9159] EXT4-fs (loop3): mount failed [ 160.224999][ T9170] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 01:05:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000080)=0x1) 01:05:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x32008a0, 0x0) 01:05:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:19 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0b, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 160.376678][ T9187] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 160.391060][ T9187] EXT4-fs (loop3): mount failed 01:05:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 160.514899][ T9194] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 160.545385][ T9205] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 01:05:20 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000f00000000000000020000000600000000000a000080000020000000d5f4655fd5f4655f0100ffff53ef01ff01000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012030000000000000000", 0x66, 0x401}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400020019000f02000000000000000b000000000f002e69", 0x20, 0x41000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111f37e65b9452c6955804d9010004ff33642466a4", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000fbdbdf25510000000a000600ffffffffffff000005008a000000000027000600ffffffffffff000005008a0000831d64606f4e1e0000000a000600ff5e4d697dff0000"], 0x48}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000105) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x0, 0x0) 01:05:20 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0c, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x4}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x4b47, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) tgkill(r1, r2, 0xb) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 161.056070][ T9214] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 161.070719][ T9216] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 161.092466][ T9222] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:05:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x0, 0x0) 01:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 161.115124][ T9222] EXT4-fs (loop3): mount failed 01:05:20 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0d, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x8}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 161.286374][ T9249] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 161.402907][ T9238] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:05:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x60}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x0, 0x0) 01:05:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0e, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:21 executing program 1: sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c3a0f4a5aac66418c132d26", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf25030000000500040002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x94) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, r2) r3 = getpid() sendmsg$netlink(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@cred={{0x1c, 0x1, 0x2, {r3, r2}}}], 0x20}, 0x0) quotactl(0x1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f00000002c0)) syz_usb_connect$hid(0x6, 0x0, 0x0, &(0x7f0000000480)={0xa, &(0x7f00000002c0)={0xa, 0x6, 0x402, 0x9, 0x32, 0xfd, 0x20, 0x7f}, 0xfe, &(0x7f0000000300)={0x5, 0xf, 0xfe, 0x4, [@generic={0xba, 0x10, 0xb, "21cb2dc9fdc743d74180eda187c73e390d7e51e740e3408c1acb39c7ff75524f5c4f38b70419023dc6795d960b2cdceb59d6f1b76e0b74ba1d0021f6802d33327ebe874100127961b3db6f32f700c7a9498779c1c143e4279c3199babca5de255acf4da52b97e97958c01c27a0cf1542e99e7d6059bb87c37b44a5f184eb3d5d7df92ffe30a59a5ea700fbf841337662ed5d730598cd488dd4a6e7259bd0d555d8efb7a63652953ed198e3663d83bdbc7d366ac2158d08"}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x1000, 0xf0f, 0x5, [0x0, 0x18000, 0xff00, 0xc0, 0x0, 0xff0000]}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x1, 0x7, 0xdd}, @ss_container_id={0x14, 0x10, 0x4, 0xff, "4f6de6b91775c6f7ff6020eb1d9796ab"}]}, 0x2, [{0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0x2801}}, {0x8, &(0x7f0000000440)=@string={0x8, 0x3, "ddda6548da9d"}}]}) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r4 = syz_genetlink_get_family_id$batadv(0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r5) ioctl$EVIOCRMFF(r5, 0x4b47, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f00000005c0)=0x3f) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)={0x1c, r4, 0x205, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x40}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x48004) 01:05:21 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x8e}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 161.953000][ T9271] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 161.957344][ T9270] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 161.991596][ T9271] Quota error (device loop3): dq_insert_tree: Quota tree root isn't allocated! 01:05:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0f, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 162.007498][ T9271] Quota error (device loop3): qtree_write_dquot: Error -5 occurred while creating quota [ 162.028807][ T9271] Quota error (device loop3): dq_insert_tree: Quota tree root isn't allocated! [ 162.038377][ T9271] Quota error (device loop3): qtree_write_dquot: Error -5 occurred while creating quota 01:05:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f10, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 162.125573][ T9295] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 162.149777][ T9295] EXT4-fs (loop2): mount failed 01:05:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x4}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:21 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f0e, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 162.187360][ T9302] Quota error (device loop3): dq_insert_tree: Quota tree root isn't allocated! [ 162.208207][ T9302] Quota error (device loop3): qtree_write_dquot: Error -5 occurred while creating quota [ 162.250797][ T9318] Quota error (device loop3): dq_insert_tree: Quota tree root isn't allocated! [ 162.260961][ T9318] Quota error (device loop3): qtree_write_dquot: Error -5 occurred while creating quota [ 162.273769][ T9278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9278 comm=syz-executor.1 [ 162.992110][ T9326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9326 comm=syz-executor.1 01:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:22 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f12, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x33}, @ldst={0x1, 0x2, 0x6, 0x4, 0x9, 0x2, 0x8}], &(0x7f00000002c0)='GPL\x00', 0xffffffe0, 0x88, &(0x7f0000000300)=""/136, 0x40f00, 0x3, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x10, 0x2, 0x9}, 0x10}, 0x78) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 01:05:22 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r2, &(0x7f00000001c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 01:05:22 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x208500, 0x122) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f00000002c0)={0x1, 'nr0\x00', {}, 0x8}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000540)={{{@in=@loopback, @in6=@ipv4={[], [], @private}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xfcdc) ioprio_get$uid(0x3, r3) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fstat(r5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r6, @ANYBLOB='\"gid=', @ANYRESHEX=r6, @ANYBLOB=',huge=always']) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) getgroups(0x6, &(0x7f00000001c0)=[r6, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee01]) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x8}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:22 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f18, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x60}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 163.181028][ T9339] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 163.195580][ T9336] Quota error (device loop3): dq_insert_tree: Quota tree root isn't allocated! [ 163.214792][ T9336] Quota error (device loop3): qtree_write_dquot: Error -5 occurred while creating quota 01:05:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000140)="020000010300006fa4d3ba49b876e2be4b000400000019000f0003000b6eff5bdb5ca28affb837a017242c6e7f3f876ffa131f8ff95b01e6df090ef8a5a806a648315c473fb0b29b85f27af92a703d4412a4bda7ef52c5b3f0fb248ce40a6ca4e49fee21edcdccaba85dfe50e53dd36bf4ec0bf3f844aa632f695be7bb70b146e07b29f480fc", 0x86, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x33}, @ldst={0x1, 0x2, 0x6, 0x4, 0x9, 0x2, 0x8}], &(0x7f00000002c0)='GPL\x00', 0xffffffe0, 0x88, &(0x7f0000000300)=""/136, 0x40f00, 0x3, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x10, 0x2, 0x9}, 0x10}, 0x78) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 01:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x8e}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 163.246708][ T9339] Quota error (device loop2): write_blk: dquota write failed 01:05:22 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003fe0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 163.429731][ T9371] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 9989649019145551874)! [ 163.447757][ T9371] EXT4-fs (loop1): group descriptors corrupted! 01:05:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 163.510374][ T9378] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 163.540086][ T9371] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 9989649019145551874)! [ 163.564653][ T9371] EXT4-fs (loop1): group descriptors corrupted! 01:05:23 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r2, &(0x7f00000001c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 01:05:23 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003fef, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x33}, @ldst={0x1, 0x2, 0x6, 0x4, 0x9, 0x2, 0x8}], &(0x7f00000002c0)='GPL\x00', 0xffffffe0, 0x88, &(0x7f0000000300)=""/136, 0x40f00, 0x3, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x10, 0x2, 0x9}, 0x10}, 0x78) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 01:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:23 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x100000001}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = openat$cgroup_ro(r2, &(0x7f0000000400)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x3) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r5) ioctl$EVIOCRMFF(r5, 0x4b47, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r4, @ANYBLOB=',gid=', @ANYRESOCT, @ANYBLOB=',huge=always']) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x6a, 0x7d, 0x1, {{0x0, 0x50, 0x40, 0x0, {0x80, 0x2, 0x5}, 0xc100000, 0x5a, 0x80, 0x8, 0x5, '\'+\xf2$]', 0xb, '--/*\\#[+,&$', 0x0, '', 0xd, 'security.ima\x00'}, 0x5, 'ext4\x00', 0xee00, r4, r6}}, 0x6a) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)='./file0\x00', r0) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) clock_adjtime(0x2, &(0x7f0000000440)={0x7, 0x80000001, 0xca5, 0x7, 0x2c, 0x80000001, 0xffffffffffffffff, 0x4, 0x7, 0x10, 0xfffffffffffffeff, 0x6eb8, 0x10001, 0x80000001, 0xffff, 0x5, 0x200, 0x4, 0xadd, 0x0, 0x2, 0x9, 0xb85, 0x3f, 0x4, 0x7ce99e3}) 01:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x33}, @ldst={0x1, 0x2, 0x6, 0x4, 0x9, 0x2, 0x8}], &(0x7f00000002c0)='GPL\x00', 0xffffffe0, 0x88, &(0x7f0000000300)=""/136, 0x40f00, 0x3, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x10, 0x2, 0x9}, 0x10}, 0x78) 01:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 164.011866][ T9402] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 164.038750][ T9408] EXT4-fs (loop1): unsupported descriptor size 0 01:05:23 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 164.274458][ T9439] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 164.374048][ T9408] tmpfs: Bad value for 'gid' 01:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:23 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r2, &(0x7f00000001c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 01:05:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) 01:05:23 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x4, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 164.879902][ T9452] EXT4-fs mount: 11 callbacks suppressed [ 164.879912][ T9452] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 164.913582][ T9454] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 164.954178][ T9408] EXT4-fs (loop1): unsupported descriptor size 0 [ 164.955839][ T9454] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 165.222780][ T9424] tmpfs: Bad value for 'gid' 01:05:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8e}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:24 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x7, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) 01:05:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80000, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0xcc, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7fffffff}, {0x6, 0x11, 0x4}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0x6, 0x11, 0x7c}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x7f}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24000840}, 0x10000) ioctl$HIDIOCGNAME(r1, 0x80404806, &(0x7f0000000080)) 01:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 165.349896][ T9480] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 165.360007][ T9477] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 165.387412][ T9480] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters [ 165.395587][ T9482] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 165.509555][ T9500] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 165.511257][ T9502] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 165.562545][ T9511] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters 01:05:24 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, 0x0, 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:24 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="02", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0xfffffffffffffeda, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x7}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x13, 0xffffffffffffffff, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, r0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xfbe, 0x101200) write$P9_RSYMLINK(r1, &(0x7f00000001c0)={0x14, 0x11, 0x1, {0x40, 0x1, 0x4}}, 0x14) 01:05:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:24 executing program 2: setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 165.739776][ T9518] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 165.749897][ T9521] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 165.773889][ T9518] EXT4-fs error (device loop2): ext4_mb_generate_buddy:747: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters 01:05:24 executing program 2: setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:24 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xf, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 165.855578][ T9529] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 165.903913][ T9545] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 165.961970][ T9529] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:05:25 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, 0x0, 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8e00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:25 executing program 2: setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000180)={0x2327, 0x6, [{0xf, 0x1}, {0x7}, {0xb, 0x1}, {0x7}, {0x9}, {0x8, 0x1}]}) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000080)={0x1, 0x6, [0xb0, 0x5, 0x40, 0x80, 0x8], 0x81}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x7c, r3, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x4}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5d}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x7c}}, 0x0) r4 = openat(r0, &(0x7f00000001c0)='./file0/file0\x00', 0x20, 0x5c) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x1, 0x700, 0xffff88c3, 0xaa87, {{0x18, 0x4, 0x2, 0x8, 0x60, 0x67, 0x0, 0x2, 0x29, 0x0, @remote, @empty, {[@cipso={0x86, 0x35, 0x3, [{0x6, 0x12, "14c82c842dda73f891b0500d77ef51f0"}, {0x7, 0xf, "576cb19168e43a4af2990beb09"}, {0x5, 0xe, "bf9f480ce43b01d6748c48a6"}]}, @timestamp={0x44, 0x14, 0xe3, 0x0, 0x7, [0x8, 0x0, 0xffffffff, 0x6]}]}}}}}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:25 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x10, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 166.628642][ T9567] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:05:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:25 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x23, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 166.835515][ T9592] syz-executor.5 (9592) used greatest stack depth: 21424 bytes left [ 166.962102][ T9605] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 166.983120][ T9605] EXT4-fs (loop3): mount failed 01:05:26 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, 0x0, 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x20}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0xc3) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip_vs_stats_percpu\x00') ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6gre0\x00', 0x0, 0x29, 0x80, 0x0, 0x81, 0x4, @remote, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x10, 0x9, 0x847}}) pwritev2(r3, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfe}, {&(0x7f0000000580)="47ae4d74b15a181cd4b11faeeb090bd3e442a05ee5f6d5e7408dae839aa446d89748caf845e67b9c92e4cd4255096bf7b78ed7e387409fa652783077aa8129fc82ee18bcf5b198bd29af78bc", 0x4c}, {&(0x7f0000000600)="e789d65d329c80b7f39ae6a54bdddb514803a54c4e1dc4607b964d", 0x1b}, {&(0x7f0000000640)="9dc14758944910dda3b798c46f73da49f4ffe783bd2d6875b95855", 0x1b}], 0x4, 0x2, 0x8, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0xe01, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x81) 01:05:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:26 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xe0, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 167.490456][ T9617] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 167.514550][ T9617] EXT4-fs (loop3): mount failed 01:05:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 167.572679][ T9627] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:05:26 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xf0, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) [ 167.739467][ T9627] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 167.751438][ T9647] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 167.765488][ T9647] EXT4-fs (loop3): mount failed 01:05:27 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:27 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xffe0, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) creat(&(0x7f0000000080)='./file0\x00', 0x1) 01:05:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8e}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 168.359079][ T9669] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 168.370840][ T9669] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 168.371274][ T9664] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 168.385386][ T9669] EXT4-fs (loop3): mount failed 01:05:27 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xfff0, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20800, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000002c0)={0x2f, 0x21, [], [@generic={0xff, 0xfd, "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"}, @jumbo={0xc2, 0x4, 0x8}, @enc_lim={0x4, 0x1, 0xc2}, @enc_lim={0x4, 0x1, 0x2}]}, 0x118) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 168.491594][ T9688] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 168.510254][ T9688] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 168.526683][ T9688] EXT4-fs (loop3): mount failed [ 168.541652][ T9701] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:05:28 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:28 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xffffffe0, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x3fc}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0xfffffffffffffea6, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030800000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES64, @ANYRESDEC]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 169.206840][ T9714] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 169.221185][ T9724] device lo entered promiscuous mode [ 169.226909][ T9724] device ip_vti0 entered promiscuous mode [ 169.230004][ T9712] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 169.232924][ T9714] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 169.258280][ T9724] device ip6_vti0 entered promiscuous mode [ 169.264546][ T9724] device sit0 entered promiscuous mode [ 169.270186][ T9724] device ip6tnl0 entered promiscuous mode [ 169.276084][ T9724] device syz_tun entered promiscuous mode [ 169.277837][ T9714] EXT4-fs (loop3): mount failed [ 169.282022][ T9724] device dummy0 entered promiscuous mode [ 169.293443][ T9724] device xfrm0 entered promiscuous mode [ 169.299371][ T9724] device wlan0 entered promiscuous mode 01:05:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 169.305703][ T9724] device wlan1 entered promiscuous mode 01:05:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 169.354566][ T9716] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:05:28 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xfffffff0, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 169.442902][ T9741] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 169.447161][ T9716] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 169.461746][ T9740] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 169.466490][ T9749] device lo left promiscuous mode 01:05:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000080)="02000000030000000400000019000f000300040000000000000000000f002e69fe3ec00a453783409cef59a06bcfa2db728dc808a9db6c102527a56b482f08c3e0218be5711128d29a88dfb635663bd6e729b501afc76ddf658471125f5ba54c4fc46e", 0x63, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000180)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 169.482136][ T9741] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 169.483003][ T9749] device ip_vti0 left promiscuous mode [ 169.497763][ T9741] EXT4-fs (loop3): mount failed [ 169.502301][ T9749] device ip6_vti0 left promiscuous mode [ 169.512625][ T9749] device sit0 left promiscuous mode [ 169.526502][ T9749] device ip6tnl0 left promiscuous mode [ 169.533665][ T9749] device syz_tun left promiscuous mode [ 169.539271][ T9749] device dummy0 left promiscuous mode [ 169.544797][ T9749] device xfrm0 left promiscuous mode [ 169.550167][ T9749] device wlan0 left promiscuous mode [ 169.555549][ T9749] device wlan1 left promiscuous mode [ 169.727101][ T9760] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 774688396550340610)! [ 169.739545][ T9760] EXT4-fs (loop1): group descriptors corrupted! 01:05:29 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a090000000000066b02bead27db054684d0d7fecb09c25d206d99e04dea9a1f327e56742e230f10d20f0190c89d8726cdb8343ed0e134e5444b5f291ec3e0ea86a265bddbcba41bcbacdaccc489f97e122fdba224a12d836dd206789240a31025f16b46c0b9918491", 0x76, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:29 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0xffffffff, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 170.103303][ T9767] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 170.115377][ T9777] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 170.127287][ T9777] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 170.142456][ T9788] device lo entered promiscuous mode 01:05:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:29 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x2, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) [ 170.143635][ T9774] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 170.162702][ T9777] EXT4-fs (loop3): mount failed [ 170.164245][ T9788] device ip_vti0 entered promiscuous mode [ 170.173874][ T9788] device ip6_vti0 entered promiscuous mode [ 170.181561][ T9788] device sit0 entered promiscuous mode [ 170.187139][ T9788] device ip6tnl0 entered promiscuous mode [ 170.193608][ T9788] device syz_tun entered promiscuous mode 01:05:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x9, @loopback, 0x20}, 0x1c) 01:05:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) [ 170.210743][ T9788] device dummy0 entered promiscuous mode [ 170.219537][ T9788] device xfrm0 entered promiscuous mode [ 170.228186][ T9788] device wlan0 entered promiscuous mode [ 170.236958][ T9788] device wlan1 entered promiscuous mode [ 170.293008][ T9805] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 170.294524][ T9799] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 170.333675][ T9799] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 170.348527][ T9799] EXT4-fs (loop3): mount failed 01:05:30 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8e00}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, r5) r6 = getpid() sendmsg$netlink(r3, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@cred={{0x1c, 0x1, 0x2, {r6, r5}}}], 0x20}, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000080)='./file0\x00', r5, r7, 0x1000) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:30 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x3, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) [ 170.964809][ T9817] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 170.974807][ T9825] device lo left promiscuous mode [ 170.981758][ T9825] device ip_vti0 left promiscuous mode [ 171.002388][ T9825] device ip6_vti0 left promiscuous mode [ 171.008585][ T9825] device sit0 left promiscuous mode [ 171.008640][ T9827] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 171.019045][ T9825] device ip6tnl0 left promiscuous mode [ 171.030692][ T9825] device syz_tun left promiscuous mode [ 171.034090][ T9827] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 171.036225][ T9825] device dummy0 left promiscuous mode [ 171.052330][ T9827] EXT4-fs (loop3): mount failed 01:05:30 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x4, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 171.059472][ T9825] device xfrm0 left promiscuous mode [ 171.062492][ T9834] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 171.065990][ T9825] device wlan0 left promiscuous mode [ 171.082444][ T9834] EXT4-fs (loop2): mount failed [ 171.090678][ T9825] device wlan1 left promiscuous mode 01:05:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x5}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="ef", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000180)=ANY=[]) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x5, 0x3fb0}, {0xbd9, 0x8}], 0xee00}, 0x18, 0x1) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 171.215777][ T9853] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 171.226686][ T9853] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 171.241942][ T9853] EXT4-fs (loop3): mount failed [ 171.333141][ T9858] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 171.386239][ T9858] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:05:30 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:30 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x5, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="1013b048d32cc35fc1e747ccc081af9128a95f84384cdf893f5be98812d6694d01fed10b4ba15e52b479c081d1ec06a6b7b5c357986cbe7847777a32485c05726eea4fd233bb9afd79", 0x49, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) memfd_create(&(0x7f00000000c0)='ext4\x00', 0x4) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x800) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 171.851632][ T9873] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 171.866884][ T9873] EXT4-fs (loop2): mount failed [ 171.875882][ T9877] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:05:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:31 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x6, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 171.877879][ T9878] EXT4-fs error (device loop1): ext4_quota_enable:5992: comm syz-executor.1: inode #1219498768: comm syz-executor.1: iget: illegal inode # [ 171.894119][ T9877] EXT4-fs (loop3): mount failed [ 171.905289][ T9878] EXT4-fs error (device loop1): ext4_quota_enable:5994: comm syz-executor.1: Bad quota inode # 1219498768 [ 171.921092][ T9878] EXT4-fs warning (device loop1): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 171.936272][ T9878] EXT4-fs (loop1): mount failed 01:05:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 172.069528][ T9878] EXT4-fs error (device loop1): ext4_quota_enable:5992: comm syz-executor.1: inode #1219498768: comm syz-executor.1: iget: illegal inode # [ 172.086916][ T9878] EXT4-fs error (device loop1): ext4_quota_enable:5994: comm syz-executor.1: Bad quota inode # 1219498768 [ 172.099572][ T9878] EXT4-fs warning (device loop1): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 172.106284][ T9908] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 172.115705][ T9878] EXT4-fs (loop1): mount failed [ 172.136526][ T9903] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 172.146776][ T9908] EXT4-fs (loop3): mount failed [ 172.157136][ T9903] EXT4-fs (loop2): mount failed 01:05:31 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000000200)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:31 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x7, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xd519) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r1) ioctl$EVIOCRMFF(r1, 0x4b47, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0xb60, 0x401, 0x6c, 0x200, 0x8001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETXW(r3, 0x5435, &(0x7f00000000c0)={0xffff, 0x4, [0xfff, 0xc6, 0x8b7, 0x6, 0x40], 0x200}) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) r4 = dup2(r0, r0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000080)=0x110119, 0x4) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 01:05:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 172.708264][ T9930] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 172.726459][ T9931] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:05:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 172.746233][ T9938] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 172.757729][ T9931] EXT4-fs (loop2): mount failed [ 172.771659][ T9938] EXT4-fs (loop3): mount failed 01:05:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:31 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x8, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81ffffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 172.909621][ T9961] EXT4-fs error (device loop3): ext4_ext_check_inode:498: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 172.932932][ T9961] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 172.933840][ T9967] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 172.947503][ T9971] device lo entered promiscuous mode [ 172.958082][ T9967] EXT4-fs (loop2): mount failed [ 172.968923][ T9961] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 172.978421][ T9971] device ip_vti0 entered promiscuous mode [ 172.990627][ T9971] device ip6_vti0 entered promiscuous mode [ 172.997471][ T9971] device sit0 entered promiscuous mode [ 173.007097][ T9971] device ip6tnl0 entered promiscuous mode [ 173.014501][ T9971] device syz_tun entered promiscuous mode [ 173.015782][ T9961] EXT4-fs (loop3): mount failed [ 173.022068][ T9971] device dummy0 entered promiscuous mode [ 173.031358][ T9971] device xfrm0 entered promiscuous mode [ 173.038112][ T9971] device wlan0 entered promiscuous mode [ 173.044793][ T9971] device wlan1 entered promiscuous mode 01:05:32 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x10004, 0x1d}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x3, 0x54) splice(0xffffffffffffffff, &(0x7f0000000180)=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="b2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) bind$packet(r3, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 01:05:32 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x9, 0x0, r0, &(0x7f0000000000), 0x3000}]) 01:05:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8e000000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_AIE_ON(r1, 0x7001) [ 173.586694][ T9982] device lo left promiscuous mode [ 173.592047][ T9982] device ip_vti0 left promiscuous mode [ 173.597654][ T9982] device ip6_vti0 left promiscuous mode [ 173.604230][ T9982] device sit0 left promiscuous mode [ 173.609611][ T9982] device ip6tnl0 left promiscuous mode [ 173.625353][ T9982] device syz_tun left promiscuous mode [ 173.631759][ T9982] device dummy0 left promiscuous mode [ 173.640058][ T9982] device xfrm0 left promiscuous mode [ 173.647163][ T9983] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 173.651137][ T9984] EXT4-fs error (device loop3): ext4_ext_check_inode:498: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 173.680599][ T9983] EXT4-fs (loop2): mount failed 01:05:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140), 0x0, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) 01:05:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:05:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f00000002c0)="111fc0d901000000803a0900803a09000000000006bd277896d0af9ee3aba5b169b5ffa8b07d8c3dfc41e2ec902aa5701857539fdc56f149af49db8f738004511f883b8343911f0f2cd36d111723d815a82a96f834c1b25a0e6ec5b5cc3fef7e8f66949857e9e5db660d1d384b62c906ab6584dc805f8c9cf0b323e7a14d27f4c76721dbb8fc8ff4e8c2d69a02f8431a4dd08a216b8f58ecc83d9ee953b9e095cd07525f0fd6b1bb804a5d670226dc18e1f5314e95e6320191f48f3e8e13841c4c8c4a85ac219cfc8c76e65071f88525be15d878134ab35cd97452c2b6210d9e4d7a26e44190691f2cc05655ade65510dc65c49a0c0b7b", 0xf7, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000080)={0x21}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0x51) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x9) [ 173.690807][ T9993] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 173.690829][ T9982] device wlan0 left promiscuous mode [ 173.705986][ T9984] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 173.716813][ T9984] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 173.730891][ T9982] device wlan1 left promiscuous mode [ 173.731056][ T9984] EXT4-fs (loop3): mount failed 01:05:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.ima\x00', 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "810725c47e40fe8d31db2518529282e6"}, 0x11, 0x1) 01:05:32 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x7fff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0xa, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 173.810065][T10009] device lo entered promiscuous mode [ 173.815890][T10009] device ip_vti0 entered promiscuous mode [ 173.822397][T10009] device ip6_vti0 entered promiscuous mode [ 173.828531][T10009] device sit0 entered promiscuous mode [ 173.844036][T10009] device ip6tnl0 entered promiscuous mode [ 173.851017][T10009] device syz_tun entered promiscuous mode [ 173.864447][T10009] device dummy0 entered promiscuous mode [ 173.868277][T10007] EXT4-fs warning (device loop2): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 173.874690][T10009] device xfrm0 entered promiscuous mode [ 173.894203][T10016] EXT4-fs error (device loop3): ext4_ext_check_inode:498: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 01:05:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc3ffffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 173.901948][T10009] device wlan0 entered promiscuous mode [ 173.913607][T10007] EXT4-fs (loop2): mount failed [ 173.924871][T10016] EXT4-fs error (device loop3): ext4_quota_enable:5994: comm syz-executor.3: Bad quota inode # 3 [ 173.927362][T10009] device wlan1 entered promiscuous mode [ 173.936370][T10016] EXT4-fs warning (device loop3): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 173.955327][T10016] EXT4-fs (loop3): mount failed [ 173.993554][T10020] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 174.038313][T10020] __quota_error: 75 callbacks suppressed [ 174.038324][T10020] Quota error (device loop1): qtree_write_dquot: Error -1632644970 occurred while creating quota [ 174.062271][ T368] BUG: unable to handle page fault for address: fffffbfff3d5fa1f [ 174.070004][ T368] #PF: supervisor read access in kernel mode [ 174.075996][ T368] #PF: error_code(0x0000) - not-present page [ 174.081961][ T368] PGD 21fff3067 P4D 21fff3067 PUD 21ffb6067 PMD 0 [ 174.088453][ T368] Oops: 0000 [#1] PREEMPT SMP KASAN [ 174.094404][ T368] CPU: 0 PID: 368 Comm: syz-executor.1 Not tainted 5.4.69-syzkaller-00867-g9d0d630081ae #0 [ 174.104357][ T368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.115467][ T368] RIP: 0010:check_memory_region+0x70/0x2f0 [ 174.121244][ T368] Code: 49 bd 01 00 00 00 00 fc ff df 4d 01 ea 4d 89 d6 4d 29 ce 49 83 fe 10 7f 2b 4d 85 f6 0f 84 b9 01 00 00 4c 89 cb 4c 29 d3 66 90 <45> 0f b6 19 45 84 db 0f 85 03 02 00 00 49 ff c1 48 ff c3 75 eb e9 [ 174.140824][ T368] RSP: 0018:ffff88819f4679d0 EFLAGS: 00010287 [ 174.146859][ T368] RAX: 6a4ef50d552b7501 RBX: ffffffffffffffff RCX: ffffffff818f1314 [ 174.154818][ T368] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff9eafd0fa [ 174.162767][ T368] RBP: ffffffff9eafd096 R08: dffffc0000000000 R09: fffffbfff3d5fa1f [ 174.170724][ T368] R10: fffffbfff3d5fa20 R11: 0000000000000004 R12: 1ffffffff3d5fa1f [ 174.178666][ T368] R13: dffffc0000000001 R14: 0000000000000001 R15: ffffffff9eafd0fa [ 174.186613][ T368] FS: 0000000001acd940(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 [ 174.195522][ T368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 174.202075][ T368] CR2: fffffbfff3d5fa1f CR3: 000000019f450002 CR4: 00000000001606f0 [ 174.210021][ T368] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 174.217975][ T368] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 174.225916][ T368] Call Trace: [ 174.229191][ T368] dqput+0x74/0x770 [ 174.232984][ T368] ? ext4_es_lookup_extent+0x900/0x900 [ 174.238412][ T368] dquot_drop+0x1dd/0x2a0 [ 174.242733][ T368] ext4_clear_inode+0x4c/0x170 [ 174.247491][ T368] ext4_evict_inode+0x714/0x1a70 [ 174.252400][ T368] ? sb_clear_inode_writeback+0x2c0/0x2c0 [ 174.258090][ T368] ? ext4_truncate_restart_trans+0xe0/0xe0 [ 174.263894][ T368] ? _raw_spin_trylock_bh+0x190/0x190 [ 174.269244][ T368] ? mempool_free+0x84/0x380 [ 174.273812][ T368] ? ext4_truncate_restart_trans+0xe0/0xe0 [ 174.279606][ T368] evict+0x29b/0x6a0 [ 174.283475][ T368] ? list_lru_del+0x3fc/0x440 [ 174.288122][ T368] evict_inodes+0x608/0x690 [ 174.292595][ T368] ? clear_inode+0x180/0x180 [ 174.297155][ T368] ? sync_filesystem+0x19e/0x200 [ 174.302069][ T368] generic_shutdown_super+0x8f/0x2a0 [ 174.307333][ T368] kill_block_super+0x79/0xd0 [ 174.311980][ T368] deactivate_locked_super+0xaf/0x100 [ 174.317342][ T368] deactivate_super+0x1b8/0x280 [ 174.322257][ T368] ? deactivate_locked_super+0x100/0x100 [ 174.328127][ T368] ? dput+0x4ed/0x5e0 [ 174.332106][ T368] ? _raw_spin_lock_irqsave+0x1c0/0x1c0 [ 174.337626][ T368] ? find_next_bit+0xd8/0x120 [ 174.342288][ T368] cleanup_mnt+0x432/0x4e0 [ 174.346692][ T368] task_work_run+0x176/0x1a0 [ 174.351318][ T368] prepare_exit_to_usermode+0x286/0x2e0 [ 174.356834][ T368] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.362696][ T368] RIP: 0033:0x4608b7 [ 174.366572][ T368] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.386313][ T368] RSP: 002b:00007ffee5a078b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 174.394742][ T368] RAX: 0000000000000000 RBX: 000000000002a919 RCX: 00000000004608b7 [ 174.402688][ T368] RDX: 0000000000403158 RSI: 0000000000000002 RDI: 00007ffee5a07960 [ 174.410646][ T368] RBP: 00000000000002e7 R08: 0000000000000000 R09: 000000000000000b [ 174.419282][ T368] R10: 0000000000000005 R11: 0000000000000246 R12: 00007ffee5a089f0 [ 174.427341][ T368] R13: 0000000001ace940 R14: 0000000000000000 R15: 00007ffee5a089f0 [ 174.435309][ T368] Modules linked in: [ 174.440135][ T368] CR2: fffffbfff3d5fa1f [ 174.444280][ T368] ---[ end trace d92af14b7d7d1e31 ]--- [ 174.449709][ T368] RIP: 0010:check_memory_region+0x70/0x2f0 [ 174.455535][ T368] Code: 49 bd 01 00 00 00 00 fc ff df 4d 01 ea 4d 89 d6 4d 29 ce 49 83 fe 10 7f 2b 4d 85 f6 0f 84 b9 01 00 00 4c 89 cb 4c 29 d3 66 90 <45> 0f b6 19 45 84 db 0f 85 03 02 00 00 49 ff c1 48 ff c3 75 eb e9 [ 174.475120][ T368] RSP: 0018:ffff88819f4679d0 EFLAGS: 00010287 [ 174.481177][ T368] RAX: 6a4ef50d552b7501 RBX: ffffffffffffffff RCX: ffffffff818f1314 [ 174.489125][ T368] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff9eafd0fa [ 174.497087][ T368] RBP: ffffffff9eafd096 R08: dffffc0000000000 R09: fffffbfff3d5fa1f [ 174.505216][ T368] R10: fffffbfff3d5fa20 R11: 0000000000000004 R12: 1ffffffff3d5fa1f [ 174.514118][ T368] R13: dffffc0000000001 R14: 0000000000000001 R15: ffffffff9eafd0fa [ 174.522080][ T368] FS: 0000000001acd940(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 [ 174.530987][ T368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 174.537539][ T368] CR2: fffffbfff3d5fa1f CR3: 000000019f450002 CR4: 00000000001606f0 [ 174.545495][ T368] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 174.553449][ T368] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 174.561419][ T368] Kernel panic - not syncing: Fatal exception [ 174.568014][ T368] Kernel Offset: disabled [ 174.573016][ T368] Rebooting in 86400 seconds..