a failure. [ 138.014890][T15481] name failslab, interval 1, probability 0, space 0, times 0 [ 138.023611][T15466] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 138.048573][T15481] CPU: 1 PID: 15481 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 138.057009][T15481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:53:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000052f8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 138.058891][T15455] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 138.067159][T15481] Call Trace: [ 138.067169][T15481] dump_stack_lvl+0xb7/0x103 [ 138.067194][T15481] dump_stack+0x11/0x1a [ 138.067211][T15481] should_fail+0x23c/0x250 [ 138.075587][T15455] System zones: [ 138.078839][T15481] ? kzalloc+0x1d/0x30 [ 138.078863][T15481] __should_failslab+0x81/0x90 [ 138.083426][T15455] 0-2 [ 138.087556][T15481] should_failslab+0x5/0x20 [ 138.087577][T15481] __kmalloc+0x66/0x340 [ 138.091969][T15455] , 18-18 [ 138.095514][T15481] kzalloc+0x1d/0x30 18:53:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01001b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010060, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000003f8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 138.099566][T15455] , 34-35 [ 138.104301][T15481] kobject_get_path+0x7c/0x110 [ 138.106882][T15455] [ 138.110621][T15455] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 138.111536][T15481] kobject_uevent_env+0x1be/0xc40 [ 138.111581][T15481] ? disk_unblock_events+0x35/0x40 [ 138.111602][T15481] disk_force_media_change+0xe3/0x170 [ 138.160734][T15481] loop_configure+0x6c0/0xeb0 [ 138.165506][T15481] ? terminate_walk+0x263/0x280 18:53:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000408000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 138.170351][T15481] lo_ioctl+0x59b/0x1370 [ 138.174778][T15481] ? path_openat+0x18c3/0x1e90 [ 138.179585][T15481] ? putname+0xc6/0xe0 [ 138.183667][T15481] ? ___cache_free+0x3c/0x300 [ 138.188341][T15481] ? blkdev_common_ioctl+0x405/0x10a0 [ 138.193725][T15481] ? selinux_file_ioctl+0x8e0/0x970 [ 138.198911][T15481] ? lo_release+0x120/0x120 [ 138.203399][T15481] blkdev_ioctl+0x1d0/0x3e0 [ 138.207975][T15481] block_ioctl+0x6d/0x80 [ 138.212212][T15481] ? blkdev_iopoll+0x70/0x70 [ 138.216794][T15481] __se_sys_ioctl+0xcb/0x140 [ 138.221399][T15481] __x64_sys_ioctl+0x3f/0x50 [ 138.226058][T15481] do_syscall_64+0x3d/0x90 [ 138.230507][T15481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.236385][T15481] RIP: 0033:0x4663b7 [ 138.240420][T15481] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.260632][T15481] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 138.269125][T15481] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 138.277125][T15481] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 138.285230][T15481] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 138.293300][T15481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 138.301255][T15481] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 138.309376][T15481] loop5: detected capacity change from 0 to 264192 [ 138.334240][T15481] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 138.344593][T15481] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 138.362349][T15481] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 138.384841][T15507] loop3: detected capacity change from 0 to 264192 [ 138.396130][T15508] loop0: detected capacity change from 0 to 264192 [ 138.410370][T15507] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 138.429784][T15508] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 138.441560][T15507] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 138.459204][T15507] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 138.501468][T15508] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 138.533646][T15508] System zones: 0-2, 18-18, 34-35 [ 138.539529][T15508] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:19 executing program 2: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0xf8, 0xff, @buffer={0x0, 0x9e, &(0x7f00000004c0)=""/158}, &(0x7f0000000100)="d179184b4ec25fad36ca9cc739259aa09912eca671001b592267b8eabb0555757964ea54425ed1a28491e5a31e5db9af4e319002129ac42169abf50c5952266f9c99c9ec258ffc56b236ba75a22258c7127c38672d0bbf7ae01c1e8b28a08dbccf203987fb02a614a343617c9472a822f047550eac5bd873e0d2d656e14c68273056e590f4a34850985aedd3fd93d68c14415c5cc686c1b5386da45670d970af981dd17326a026a2c69a9f5145163e3a93d9f68309e23a17314ef5e763c8ae555e3375333f5a24443db1514285f522c3f26362ac6d9e3eaa124f22d64367e25ec8e1320592de90280098d65237c9001ca2810323d61c0076", &(0x7f0000000280)=""/80, 0xfffffff7, 0x2, 0x3, &(0x7f0000000300)}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x0, 0x28120001) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x227c, &(0x7f0000000080)) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000680)={0x0, 0xfffffffffffffffb, 0x8a, 0x47, @buffer={0x0, 0x6f, &(0x7f0000000040)=""/111}, &(0x7f0000000580)="96d7705bd8604111871ee512ca618ae41509ac658ff5d08389f562b1d3099b86edaf6bb0c907278b4b62a1e53a94c976135f7661fe9ffe48f61ed5f6fe66d49d4d0502d0fb158d667b428871fe3cfdf04c41ea5d3d99f66bdd94892e87a564d69a18077239efac6eb5814acb2c2944fbe4a363f0b78c9e095e96f3596c0fafe0dc1c14b790f431d932cc", &(0x7f00000000c0)=""/28, 0x10000, 0x10020, 0x0, &(0x7f0000000640)}) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000340)) 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200004808000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01001c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 5 (fault-call:3 fault-nth:29): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010063, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 138.612146][ C0] sd 0:0:1:0: tag#4210 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 138.618395][T15535] loop3: detected capacity change from 0 to 264192 [ 138.622192][ C0] sd 0:0:1:0: tag#4210 CDB: opcode=0xe5 (vendor) [ 138.629319][T15536] loop1: detected capacity change from 0 to 264192 [ 138.635212][ C0] sd 0:0:1:0: tag#4210 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 138.635233][ C0] sd 0:0:1:0: tag#4210 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 138.643865][T15536] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 138.650750][ C0] sd 0:0:1:0: tag#4210 CDB[20]: ba [ 138.667362][T15541] FAULT_INJECTION: forcing a failure. [ 138.667362][T15541] name failslab, interval 1, probability 0, space 0, times 0 [ 138.684263][T15541] CPU: 1 PID: 15541 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 138.692840][T15541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.702977][T15541] Call Trace: [ 138.706277][T15541] dump_stack_lvl+0xb7/0x103 [ 138.710873][T15541] dump_stack+0x11/0x1a [ 138.715067][T15541] should_fail+0x23c/0x250 [ 138.719558][T15541] __should_failslab+0x81/0x90 [ 138.724318][T15541] should_failslab+0x5/0x20 [ 138.728995][T15541] kmem_cache_alloc_node+0x58/0x2b0 [ 138.734316][T15541] ? __alloc_skb+0xed/0x420 [ 138.738863][T15541] __alloc_skb+0xed/0x420 [ 138.743196][T15541] alloc_uevent_skb+0x5b/0x120 [ 138.748015][T15541] kobject_uevent_env+0x863/0xc40 [ 138.753102][T15541] ? disk_unblock_events+0x35/0x40 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200009c08000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000100)={0x0, 0x3, 0xffffffffffffff7f}) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) [ 138.758210][T15541] disk_force_media_change+0xe3/0x170 [ 138.763581][T15541] loop_configure+0x6c0/0xeb0 [ 138.768261][T15541] ? terminate_walk+0x263/0x280 [ 138.773112][T15541] lo_ioctl+0x59b/0x1370 [ 138.777362][T15541] ? path_openat+0x18c3/0x1e90 [ 138.782130][T15541] ? putname+0xc6/0xe0 [ 138.784975][T15535] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 138.786203][T15541] ? ___cache_free+0x3c/0x300 [ 138.786224][T15541] ? blkdev_common_ioctl+0x405/0x10a0 [ 138.805547][T15541] ? selinux_file_ioctl+0x8e0/0x970 [ 138.809346][T15535] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 138.810849][T15541] ? lo_release+0x120/0x120 [ 138.828425][T15535] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 138.832872][T15541] blkdev_ioctl+0x1d0/0x3e0 [ 138.832893][T15541] block_ioctl+0x6d/0x80 [ 138.857336][T15541] ? blkdev_iopoll+0x70/0x70 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fffe8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 2: ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000002c0)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r1) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x10, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x5}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x94}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000300)={0x0, {}, 0x0, {}, 0x5, 0xa, 0x1e, 0x38, "b9df1fdfe7a3fe5ad5c49f384c3524c5d581059fc9c2e2fcdf7b9e0126c631c606a617f6685db4ed19f4caf515744cac7509fcd7a51056ce5bcae56be3b718ee", "9d4010bcf774bf7c39d33e59771cabce53874df28e9885679c2845e80f0bfe52", [0x6, 0x7]}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x10000030c) 18:53:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01001d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 138.861939][T15541] __se_sys_ioctl+0xcb/0x140 [ 138.866657][T15541] __x64_sys_ioctl+0x3f/0x50 [ 138.871287][T15541] do_syscall_64+0x3d/0x90 [ 138.875724][T15541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.881637][T15541] RIP: 0033:0x4663b7 [ 138.885523][T15541] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000feff8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000028000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 138.905378][T15541] RSP: 002b:00007f8189cc1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 138.914513][T15541] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 138.922753][T15541] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 138.933696][T15541] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 138.941764][T15541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 138.950050][T15541] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 18:53:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01001e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 138.988661][T15541] loop5: detected capacity change from 0 to 264192 [ 138.996274][T15573] loop0: detected capacity change from 0 to 264192 [ 139.020570][T15573] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000038000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 139.047260][T15587] loop1: detected capacity change from 0 to 264192 [ 139.052739][T15573] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 139.054300][T15541] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 139.062466][T15573] System zones: 0-2, 18-18, 34-35 [ 139.075955][T15596] loop3: detected capacity change from 0 to 264192 [ 139.077018][T15573] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 139.112082][T15541] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 139.129772][T15541] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 139.146753][T15596] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:19 executing program 5 (fault-call:3 fault-nth:30): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010068, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 139.176804][T15587] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 18:53:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 139.259268][T15596] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 139.270617][T15624] loop1: detected capacity change from 0 to 264192 [ 139.277033][T15596] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 139.296972][T15624] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 139.317175][T15631] FAULT_INJECTION: forcing a failure. [ 139.317175][T15631] name failslab, interval 1, probability 0, space 0, times 0 [ 139.330019][T15631] CPU: 1 PID: 15631 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 139.338474][T15631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.348516][T15631] Call Trace: [ 139.351786][T15631] dump_stack_lvl+0xb7/0x103 [ 139.356410][T15631] dump_stack+0x11/0x1a [ 139.360623][T15631] should_fail+0x23c/0x250 18:53:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000058000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 139.365136][T15631] __should_failslab+0x81/0x90 [ 139.369907][T15631] should_failslab+0x5/0x20 [ 139.374418][T15631] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 139.380140][T15631] ? __kmalloc_node_track_caller+0x30/0x40 [ 139.385945][T15631] ? kmem_cache_alloc_node+0x1d4/0x2b0 [ 139.391465][T15631] __kmalloc_node_track_caller+0x30/0x40 [ 139.397101][T15631] ? alloc_uevent_skb+0x5b/0x120 [ 139.402283][T15631] __alloc_skb+0x187/0x420 [ 139.406701][T15631] alloc_uevent_skb+0x5b/0x120 [ 139.411511][T15631] kobject_uevent_env+0x863/0xc40 [ 139.416629][T15631] ? disk_unblock_events+0x35/0x40 [ 139.421786][T15631] disk_force_media_change+0xe3/0x170 [ 139.427159][T15631] loop_configure+0x6c0/0xeb0 [ 139.432068][T15631] ? terminate_walk+0x263/0x280 [ 139.436895][T15631] lo_ioctl+0x59b/0x1370 [ 139.441205][T15631] ? path_openat+0x18c3/0x1e90 [ 139.446012][T15631] ? putname+0xc6/0xe0 [ 139.450403][T15631] ? ___cache_free+0x3c/0x300 [ 139.455172][T15631] ? blkdev_common_ioctl+0x405/0x10a0 [ 139.460536][T15631] ? selinux_file_ioctl+0x8e0/0x970 [ 139.465781][T15631] ? lo_release+0x120/0x120 [ 139.470283][T15631] blkdev_ioctl+0x1d0/0x3e0 [ 139.474765][T15631] block_ioctl+0x6d/0x80 [ 139.479006][T15631] ? blkdev_iopoll+0x70/0x70 [ 139.483578][T15631] __se_sys_ioctl+0xcb/0x140 [ 139.488150][T15631] __x64_sys_ioctl+0x3f/0x50 [ 139.492719][T15631] do_syscall_64+0x3d/0x90 [ 139.497202][T15631] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.503140][T15631] RIP: 0033:0x4663b7 [ 139.507012][T15631] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.526601][T15631] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 139.535101][T15631] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 139.543075][T15631] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 139.551552][T15631] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 139.559527][T15631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 139.567476][T15631] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 139.588553][T15631] loop5: detected capacity change from 0 to 264192 [ 139.632240][T15631] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 139.662072][T15631] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010021, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01006c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000068000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ff", 0x37, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 139.679734][T15631] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 139.718551][T15662] loop1: detected capacity change from 0 to 264192 18:53:20 executing program 5 (fault-call:3 fault-nth:31): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 139.726995][T15662] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 139.731153][T15660] loop3: detected capacity change from 0 to 264192 [ 139.762260][T15663] loop0: detected capacity change from 0 to 264192 [ 139.803686][T15663] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 139.824764][T15670] FAULT_INJECTION: forcing a failure. [ 139.824764][T15670] name failslab, interval 1, probability 0, space 0, times 0 [ 139.837436][T15670] CPU: 0 PID: 15670 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 139.845957][T15670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.856340][T15670] Call Trace: [ 139.859644][T15670] dump_stack_lvl+0xb7/0x103 [ 139.864246][T15670] dump_stack+0x11/0x1a [ 139.868490][T15670] should_fail+0x23c/0x250 [ 139.872961][T15670] ? skb_clone+0x12c/0x1f0 [ 139.882417][T15670] __should_failslab+0x81/0x90 [ 139.887187][T15670] should_failslab+0x5/0x20 [ 139.891716][T15670] kmem_cache_alloc+0x46/0x2e0 [ 139.896609][T15670] skb_clone+0x12c/0x1f0 [ 139.899151][ T25] audit: type=1400 audit(1630695200.378:97): avc: denied { setattr } for pid=15682 comm="syz-executor.2" name="syz-executor.2" dev="sda1" ino=13852 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tape_device_t:s0 tclass=file permissive=1 [ 139.900866][T15670] netlink_broadcast_filtered+0x4fd/0xb60 [ 139.927315][ C1] sd 0:0:1:0: tag#4216 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 139.931848][T15670] ? skb_put+0xb9/0xf0 [ 139.931875][T15670] netlink_broadcast+0x35/0x50 [ 139.941685][ C1] sd 0:0:1:0: tag#4216 CDB: opcode=0xe5 (vendor) [ 139.945731][T15670] kobject_uevent_env+0x8c9/0xc40 [ 139.950861][ C1] sd 0:0:1:0: tag#4216 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 139.957225][T15670] ? disk_unblock_events+0x35/0x40 [ 139.962242][ C1] sd 0:0:1:0: tag#4216 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 139.971236][T15670] disk_force_media_change+0xe3/0x170 [ 139.971262][T15670] loop_configure+0x6c0/0xeb0 [ 139.976378][ C1] sd 0:0:1:0: tag#4216 CDB[20]: ba [ 139.985427][T15670] ? terminate_walk+0x263/0x280 [ 139.985447][T15670] lo_ioctl+0x59b/0x1370 [ 140.009663][T15670] ? path_openat+0x18c3/0x1e90 [ 140.014441][T15670] ? putname+0xc6/0xe0 [ 140.018523][T15670] ? ___cache_free+0x3c/0x300 [ 140.023200][T15670] ? blkdev_common_ioctl+0x405/0x10a0 [ 140.028584][T15670] ? selinux_file_ioctl+0x8e0/0x970 [ 140.033819][T15670] ? lo_release+0x120/0x120 [ 140.038332][T15670] blkdev_ioctl+0x1d0/0x3e0 [ 140.042840][T15670] block_ioctl+0x6d/0x80 [ 140.047088][T15670] ? blkdev_iopoll+0x70/0x70 [ 140.051681][T15670] __se_sys_ioctl+0xcb/0x140 [ 140.056280][T15670] __x64_sys_ioctl+0x3f/0x50 [ 140.061205][T15670] do_syscall_64+0x3d/0x90 [ 140.065635][T15670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.071776][T15670] RIP: 0033:0x4663b7 [ 140.075672][T15670] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.095286][T15670] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:53:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000002040), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x7}, {0x2, 0x2}, {0x2, 0x1}, {0x2, 0x4, 0xee01}, {0x2, 0x6}, {0x2, 0x4, 0xee00}], {0x4, 0x4}, [{0x8, 0x2}, {0x8, 0x6}, {}, {0x8, 0x2}, {}], {0x10, 0x2}}, 0x7c, 0x1) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0x0, 0x5b, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="3a1b58f2d9ceedc50ba8b4af302e85edaf7dd7eafe5a7715256edac7c833a95b23853f7d645ae03b20bd1805e77461e81ec93844ea0264ea2b7377cd8d52dfe04fa8036710bb3d01889d9382813302e2605446af26ab8aa498b94e", &(0x7f0000000280)=""/117, 0x1, 0x8001, 0x0, &(0x7f0000000300)}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {0x0, r5}, {r4}, {r4}, {}, {}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {r4}, {r3, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {}, {}, {r3, r5}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {r4, r5}, {}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4}, {r3, r5}, {r3}, {r3}, {}, {}, {0x0, r5}, {}, {r4}, {r3}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4}, {r3, r5}, {}, {r3}, {r4, r5}, {r3}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {r3, r5}, {}, {0x0, r5}, {r3, r5}, {}, {r4, r5}, {r3}, {r4}, {}, {r3, r5}, {r3}, {0x0, r5}, {}, {r3}, {r3, r5}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {}, {}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {}, {}, {r4, r5}, {r4}, {}, {0x0, r5}, {r3}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r3, r5}, {r4, r5}, {}, {}, {}, {r4, r5}, {0x0, r5}, {}, {}, {r3}, {r3}, {0x0, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {r3}, {}, {r3}, {0x0, 0x0}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {r4}, {r4, r5}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {r4}, {r4}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4, r5}, {}, {}, {r3}, {r4, r5}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {r3}, {0x0, r5}, {r4, r5}, {r4}, {0x0, r5}, {}, {}, {}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005b580)={0x151272b0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x80, "09e90fd4c70903"}) r9 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r9, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x14, &(0x7f0000000080)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@private0}, {}, {}, 0x0, 0x6e6bb6}, {{@in=@dev}, 0x0, @in=@loopback}}, 0xe8) r11 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000001c0), 0x6, 0x8100) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000240)=0x5) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r11, 0xd000943d, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={'\x00', 0x0, 0x800, 0x60c, 0x0, 0x0, 0xffffffffffffffff}) [ 140.103700][T15670] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 140.111672][T15670] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 140.119638][T15670] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 140.127617][T15670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 140.135605][T15670] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 140.156265][T15670] loop5: detected capacity change from 0 to 264192 [ 140.165657][T15687] loop1: detected capacity change from 0 to 264192 18:53:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000078000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 140.205098][ C1] sd 0:0:1:0: tag#4217 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 140.214966][ C1] sd 0:0:1:0: tag#4217 CDB: opcode=0xe5 (vendor) [ 140.221297][ C1] sd 0:0:1:0: tag#4217 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 140.230347][ C1] sd 0:0:1:0: tag#4217 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 140.239407][ C1] sd 0:0:1:0: tag#4217 CDB[20]: ba [ 140.244642][T15660] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 140.271159][T15687] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 140.282887][T15663] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:20 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r1, 0x800000000000937e, &(0x7f00000003c0)="0100000000000000180100000508000300000000000000002fe63f596f10f6424dd13f97b3d25ad7e94dce9947a17d6de9766def174c3e3843eba0edb30203f6b0578ffd3193465af44e97a06f3f10cb18a2a028cab95d0312212d6728a0485d69eb6c5607062ca7b6491f5e42d3c12996c401fa742c01c60c1918944aff21d7aab8ba2f40d4c87eb210cf914f3592f2b4c4f09ced6c6f881f3a71d7a442eba630c49c32da4fbde36ff48a92100b5e855c02b16a16b0d62ef4e81cd7bea6ebd436ff14c342a0dd871c426ff7ecf984a98185da22fd3dd338a5b8b23db032a923614ed3da351273b09e8d674379412b712401a87bb5") perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x69, 0x8, 0x5, 0x8, 0x0, 0x40, 0x86a, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_config_ext={0x10000000000, 0x200}, 0x20, 0x4, 0x8000, 0x4, 0x4, 0x3, 0x7ff, 0x0, 0x3f, 0x0, 0x10000}, 0x0, 0xd, r1, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x10000000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000100)={0x1}) syz_io_uring_setup(0x2d65, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, &(0x7f0000000140)) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = getpid() getsockname$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, &(0x7f0000000440)=0x6e) syz_io_uring_setup(0x1db6, &(0x7f00000019c0)={0x0, 0x9db1, 0x4, 0x0, 0x297}, &(0x7f0000003000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000340), &(0x7f0000000500)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x8, 0xec, 0xff, 0x0, 0x800, 0x400, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xbfad, 0xaaf0}, 0x2000, 0x2, 0x8, 0xd, 0x3, 0xd4, 0xfffc, 0x0, 0x10000, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0xa) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) unlinkat(r3, &(0x7f0000000100)='./file0\x00', 0x200) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0xdae0, 0x5, &(0x7f0000000200)=[{&(0x7f00000001c0)="c807feff63d9058b16215f094024ecba9c6a1177119ee05f8a3289ff98f12657e4ac0b4f93ce6f026fb339", 0x2b}, {&(0x7f0000000480)="5e0264b7fc4fac6d94c1585591f58a58b67aacd4ad11f2e05deb619dcaa7ce07ed14e763e3ad36caef74f71f604d4be32d0c67835c901ce5cc538f7e9f9fbc2afc3bfe710723a1ea72", 0x49, 0x7}, {&(0x7f00000008c0)="2cbfd943d26927e9dd36abea3eb35360752e48106e9c0b43a1e452e8064905478315641167a636770f2e4ebb45787eb4bdbd79fe08fb3fbb6b6a4ddb3e1da1f385a000e3b82bfcfe0910997bab0021d7e4b5de99bf41f62057c831db2ef82a730d41ea9deef5df83b8c7e5cc898ed00da21856f1cbad399762424416317f3ba7368d62b2ff6899c767f2bd8a573f250724949cfe91ac787e78262a4453742e50575c4cd423084ee80a1a8faf296bdf77d04505a71ae5347e14433efc514ab5592f2b06bd49424ad4638489", 0xcb, 0xffffffff}, {&(0x7f0000000540)="e1c174c62a66bac9788d261ecb0d47cf00a4e9db7921237004bed3df51010bccc7f391b42fb956c1d5a203b44fccdcb0e02c199b60b329d9921039dd3ff2eb7ee0", 0x41, 0x4}, {&(0x7f00000009c0)="1c060250dd76459ec8212bece24d794b476c1893cfa5cc8712fdf388f2287992d6e9b2a63c6dbc23ebb64ec99d6e6ee9d0b1a5b15ce2e99dcaa97d6cdff4abdadbf108dcc7e094d28830d9826e245300a570676049ff4c0f19ec43984157f9aed3888e34e6a7a36d122ab679bb4efde18143f64c4517edede5886832b88e49a236638fb8d593970cb1cbcffa0532c09a4d07844b724c01abd787bf4b38b787247182c0716d5a9ebc21c7bae28f07249ce7b2e78001fd33f3d131a52e819a4f79d3ae787fcd28b1064e4944d156464c871c070cc6bd8737430bfe15f1ff1a0b95e27eadc0346cd18953575023a52ad5ba2fc2cdb33a6fee34dd1f91aec1691c4c618858d5e769b6b264e37e89c40b6e2e85de8d6b2992964eab68a05701e7d517ad995619f03c7589f8714c8c0c73fa544981f56a78c0b9b32880446f27f4f4d5aa427cd2703526bb07f2925ba28bdfe98e2f517e0a0ff0026e93737a67c00d5949aab8ea76ad10b4b6506352c790123e26523c4cf160a6ab6852e522e4082a3bfe23377cec45fba519e18772435109f5a2583a736eb32d564da8eb26c3370eef93777a918c5ce9efa0b70b77131d8411b2418f6389c44b69695a5e1c24d41e561b22591e0d63b0325c6bf80d203f24a6b9f8b69c146a2642b2c6c7bcf7818a9ffb4b5763230a5c5b4b5ae7200b8eca3501c1f67e063a14eb6f88d56467e3262604e51cfcdf412c387727f3f5334ac8d3a6800835a2c1ab9773d9a9a8f07fd4e6bbacfc5978706296f3944419782457dad58178a71afb083c7d89267b456334d0f64d364536547099df421ca52350cd86e6e41fbbc55cb407e0d5e69f5f7752fcef907f2ff450aeb824998056c8e00c54c6613d878f423523b1aad8557b4023e928d9f879b9ad849261b71b829152f1faeca3d4935ed6e3c54f964d6666ef2ce5e6ab3502530286b586272b5a4b1637b35ffad8c491d96c03dce34f4ccf0dcb579a4175760b2c315e9420d4196b21b5a099126f9f36fb5196bbc59eb19b6ae15b0948b18c30ac76d70e82c1cdefb81bd7a68096cab024b534e20ba51fd793b23bb7c13263d9a5f735b22a6a656c8b7f0ed8ec651dfa1335fe691c55748f82c49b811e00d65d53c7f9e1b8aa00ee3c07f1edc772bae1b0b46d950985433484ba3a588341ac14eb855c94cdadcba51a1d6493c40170b424894eb870f1dd0f3f9d2e0f3fb907257b0f18ea5e5faaaacda5d7da7dfca8c18a9e5a21c5f0823d9ef8baed1c7a2ec405cc2d94fd36e5c975956c6b1e4371397260ac13a626437685289c3c697645c98591eab8e1f2f0f246d8ba1438293f124304f449faa1921b5870805e17e54f72a18e23533f3616dde24bf2a9d78d67d7b1d899b17942b822955db4c4d08e5ce531a06a784237e102a55f84b343bb1f405d03c480faa98504fea7ae4f211223269a1456ebed83b93d5ba5657c4725bc28250f609010468f3a8ae19b31320a7381ab459269622a76b3b3287d9438ba144083967ac0a974a28179dc033d452b96c53d0b00c77c2991d2feb9bbfb4f0148e728d7f5e5693214afcc402249afc1e0b2e15d0076ab662428d71343af18745cc8d01382f294074f2a7eb36183d7d67419242192ee65de69a69578ce3b66c49529cc4149b7bb787b48fd468cbaa1637ac6aa0c40ef2f4b4a93440c0f815c253ba17d8c71c09e8051674442c84b94681d90c0fc298dca50697227ad37e29c9f7591a7c53fcd2b95b25700cb74cba25047155b443a50ccfcd40b149049579863ed32c9f7ef00c5a99ed12f8b462fe9460e21c6138aebab54f49c3cb207a928e5a3fd939df03a3a3a52c609b33fa6f2be30e85983a381642ab2b0f02b7bada0d2406ed24100570714c6e0950e32c545c4ebc1b75ba4fc8277645b9d518383d30fdbba7a72ee0b6d9c01258439707d2eb3daeede5e891f4fcf9e9f2eda190eaeccbcf3e7dfc71dcc20f5a6ec739562afeed2af8fcaf43b9d95f68c3270a029f691b725cd91b69b74a813ed60cfd1517c12d880af29d61664861e956661d950bb12189f50f9c4b1e00c5a8a31731b4e3a634bb6b09676d01f492a1e0d1b1c46473d2aa82f1a1dee7e4c8e086ae19a535cca637a5ed5593c03105e28ec6d37920f148aba760857e0770f735933b0cdb3cede2d72c4b4afd1f3b69be4a9e9a07e5829585226bb5d848d3d6f4d0cbc101f8e7757458bb6f1307151183411fb5d16345a95e2c1f3341dc31d4c480ea4ef4b3cfcb7720e3cb9438fe9176b4019c27581650448c47bdb9fa5077b62024ca1a496f73675cfd05ddc8f26d95ccaeab6b8a2eadb00fd3fee9a66de0a2981c90b4c19214d67397949294742d3a8cf6908cd1dc42f5546098a9eaf40166f6835ade6548c56f530cd5932c5067a11a61ccb2153c5fa0158a40e40487935ead688aa88129bc4fafc506f70170434329d752334c3962b1cca33890bd76f73a9d26f9ff41dbc564ecac10983cde7f32380381c0018f2f430bca78d14b57f595c6e7827d8f689da35c6b6f7862cc2a3b866423229d80980abff35744e52441ddf26723434e776b9184f504927d4f7af97fa439facbe0409fe0acb841dc623a8180086c700667b6ff126fb44011a982860d958fc88af292f8169fe3d7fec2dba46f68648abbc9087cb5c4e6786f39aa3b7140af6c9893af5ca13c00b9716e2ece2100990a876d3d23583a1c053c5188ffa55fc76ac1e598f1fa839d1503e0d2369b7012f4d910885e7b1eb050c15149bb4c1ebb981f52f47d1671ed9c6cfc62bff4b1799f9d42eb3d85fe2c35e0fe71964c5ef975954ce8facd9c36e3b900cab21a632d7d3239546bae6be6e27a0cefca51a72989586d5e124e0805d7e2be0d554f3528a9913f172a35992bef29bd414bfbe47c9e2eb0f282a2e8b67d792864cd52c82916c8d24c03041750694977d632bfb43b87b71111fe8336d3ec77462ff1a789597fb77217e67d36408882d254b95863718d614f035e5f97ddbbc118ef25c11a70bca66dc9cf33519cf30358812642f9605a1d514e2ae86b9d2f4c463e7af7424298541e17f818105f07ce92f16fede6e1fc4020bb59428b8be847011619d9e4448b3a9d6cc9e5b627d603a557963827977b0b396504a638d8aab1490769e0162904f782ca516a2c5fa69eda823f5e901cf3ce3af2eb0174d7c293d19109a2dd13bb07aa235c82522edb67e64b57a8aae00f49752eb8cc3715c1e67b73d65dbc759ec22ddcb12f239b32284a6f17b70be73de5f0df2cb4768d2076bd1bfeb4869cfdb7eaf09247b9efb7edcc7b9ea4a4fb65403b8408a64cb80de040a27359a9a37d638c85fe9a93df00baf678680539595afee6b513a0f6179be078781b90eae100f60ef25fc9cf103087fb546589e43d0e4d4e6889b28aa672274536738d764cbec188e2d32fecfe1a7eb73fae2f313d1e7894ae08a4c0522b79f91471784a56e864072fddc8f6dbad91c99723af59bcdf7dcd857369c98e16a8df59b70e9cb2533403a61ad98ca147e45b7488ba8f72c19896ef6b9d7ad5c114bda8b33ff7aa94510b5e5b252d8a04142cc146697a47d5a0a0ac1de02f7732bc4a1cd6c7cbafc91fc1d3a9c77c97e7132026bff5194494e1c69ae3230cb0082e8b0a63c930ab7480c12e651ad0bc7e2ee843584dbdfc224aa0e5ce2e7e9d98b8a87e85f1d2223d9ea49732649d3f221ac01b041a83230bdab19ec3f6a06bb1ceb84bb7ad2de2fa9a0600eabcdcd5314921c473f00d791fb1e8819548703c8968fcc8a73da30b05e089517ca112f3eff9fd77e637c90e03dfd377661a03c97550aea8e73778a0f480807b2b4ef558d4fdcea27ce4f9d7c82777557f7596b2acb670ef584e1016633d479cb8c506cc917f29f5acb07ef6dfa4823e8e8666bbfd8e12c67bdb0d17c6dfb09ef77bec829464061d969a11f3fac51c54a0e6b115c1153a36ab2aadf582630d6a91d408057ae803d054fe6f46aaf284d689d2902749202a9a06c61e1e4c27ac28051f72b34ee2b0ba5903e62479af73bc3fe9f293404fcff1f635617903dc6dfd78205d5a058ef4002720e1d17bb2cd5d63698a6f159d8ea668b09011f529b762bde791e2940c3dd002c3846bc8eb7922c5613a0d4bee651078fa9d0b30fab27ad95f28282a45d48b6d5c29184b31648207b95920d430ac60d19fdb46618065d21209e904846bd916ae2080d39fdb45942c115681394d75ea4357c60acdc729c71f4e85d73a981ae6694c8b2e63a1a5c14f337b78f3d6a5ad8312fd3db85897556e6b74812aa4cdb0f5ad081b805b8db943c7ce07fc9d888795d0f0fa57f1e4fa2d97b25ea78aac6de604e77d734ff880d46b622eae4a31caeef1b0c28abe989fb00673e80ba494b3449638efa6d30707b57fe543c80c8b63ea40ae7a85750dced15d63f6b76d01065b708d3719a4888bdd979790064f9bdac7e2d0aaf14d966724e001618245c43e9b720524f3cbc49a95caa79a011f0691a9336f08ec8a19ee4d961da82c3421bd6e26f6bf55d1e070a957fcc0d0d2c45a8d4f7e66b6ffd896f694f88b3b944ba08b54c2d721232f29c8b2759ac34cb790b3dc038b6da5ec205108e687da6b11e9ea50c0d5bca658bf1f8f7b1f302750b2141c47810eed03226252375b72e15e9bd55c10f10d8bdffd6f6234e9e1c95da4f86e4e0cac10d6a8f83910a305bb3ff56c9fb8b921cf47646fb44a6f15186a04bc061b4ababaeca155db27f39dc84fde7b5de880770ced171626b261661e7b108e41adffbf67720e73a1f289b7de2a11fe0c34a94fa1c9aeb58263251bf1a3ac3109760faa271f1a5fe59d02781a1fe0d927397b9d76241049c5075a81bcefdb04b980414cafe3c9ba188df67cc1c95f958f57d8b8603649c830395de7ec2627f2cf9ffa8bb3cf5890f6a1f24fd4d2eb8b6f10fa19744d3c0071040e18ba4aa4611b66b800d885ed116a950996f11cba544847cc66e6c8a1918b0632663f8b8ad4776c01d07f21221e37a7a55504a2ce0e4d2492c2737f0aebcb830b9c1f52202bb0928281636de2075866c945bae00bc58931ede7e1b502ca4eba49f07ba5834d229a86804b9666a2e59b84f72ffed34137348efc608c2be4c1542bda4365d2e1688b90e90e624b829aa7ed1623df60bd966d3e5b4d10b5c641a9ff173055bff2ef069c9b249bf74667e11abfc86f99b11876e95f92a7e375b2044b5cb9d50ee289f9b43a3615d416bdad02ff266024614d99372453b7a949af6c55f30825b3a04409ed4db63f17a73c26f0caf8f281987006b9af044facf02896a831ebafaade5c0a1237afeb621c01e28653ecf8d62676306a83c5732bb7c904a6189d92c5edc341344670c50637af33327697fce9b1db26b1d3b0efca7a0af88878296f300d8ca3db829b0a65afd446beafd7bfdd84fe97c3a5a09d36a47ce33a060d4b93e7d904af83c412060bb0c694b502558fd41df8572cd90aa5f62df4cbac47e212ef98c8436bff82ee8e1c2cc70d28df4b2f0269992cb90bc1bdb77489b673d8c7cf0b93094f21e608eed6e4bfba5725c24faba8385be288fbab80c7063319cd1b9fdc5331943c440dceada59203ac98405ccb1a60b1174d3bfad92f03116a36ee761f4d589e96523b4b4c2914242d1a23cfe4ed498f1764e4aa1a6142e27ea5238b0e7fb0d0ce2e9f829d3b1eb251cc78d207d797886bb02527136c643333b7fd9fa6b78d0a679f2d4435cf8167e1fd3845459bf9948cca9d46710d2b2e9cbfefb951c5b27", 0x1000, 0x8f97}], 0x0, &(0x7f0000000600)={[{@shortname_winnt}, {@fat=@sys_immutable}, {@shortname_mixed}, {@shortname_win95}, {@shortname_winnt}, {@fat=@dos1xfloppy}], [{@fsname={'fsname', 0x3d, '\x00'}}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) symlink(0x0, 0x0) r5 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40042406, 0x0) [ 140.315718][T15660] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 140.333360][T15660] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 140.350881][T15670] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 140.354188][T15663] System zones: 0-2, 18-18, 34-35 18:53:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 140.382289][T15670] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 140.400078][T15670] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000088000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 140.436482][T15706] loop1: detected capacity change from 0 to 264192 [ 140.445964][T15663] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 140.464407][T15706] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 18:53:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010022, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010072, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 5 (fault-call:3 fault-nth:32): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 140.594201][T15728] loop3: detected capacity change from 0 to 264192 [ 140.614419][T15728] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 140.625778][T15740] loop1: detected capacity change from 0 to 264192 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010023, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 140.634899][T15728] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 140.652438][T15728] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 140.664984][T15740] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 140.713012][T15755] FAULT_INJECTION: forcing a failure. [ 140.713012][T15755] name failslab, interval 1, probability 0, space 0, times 0 [ 140.725761][T15755] CPU: 1 PID: 15755 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 140.734170][T15755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.744228][T15755] Call Trace: [ 140.747593][T15755] dump_stack_lvl+0xb7/0x103 [ 140.752195][T15755] dump_stack+0x11/0x1a [ 140.756356][T15755] should_fail+0x23c/0x250 18:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010074, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 140.760861][T15755] __should_failslab+0x81/0x90 [ 140.765645][T15755] ? call_usermodehelper_setup+0x71/0x190 [ 140.771422][T15755] should_failslab+0x5/0x20 [ 140.775922][T15755] kmem_cache_alloc_trace+0x49/0x310 [ 140.781208][T15755] call_usermodehelper_setup+0x71/0x190 [ 140.786759][T15755] ? add_uevent_var+0x1c0/0x1c0 [ 140.791680][T15755] kobject_uevent_env+0xb29/0xc40 [ 140.796715][T15755] ? disk_unblock_events+0x35/0x40 [ 140.801830][T15755] disk_force_media_change+0xe3/0x170 [ 140.807256][T15755] loop_configure+0x6c0/0xeb0 [ 140.811935][T15755] ? terminate_walk+0x263/0x280 [ 140.816824][T15755] lo_ioctl+0x59b/0x1370 [ 140.821123][T15755] ? path_openat+0x18c3/0x1e90 [ 140.825971][T15755] ? putname+0xc6/0xe0 [ 140.830042][T15755] ? ___cache_free+0x3c/0x300 [ 140.834714][T15755] ? blkdev_common_ioctl+0x405/0x10a0 [ 140.840088][T15755] ? selinux_file_ioctl+0x8e0/0x970 [ 140.845355][T15755] ? lo_release+0x120/0x120 [ 140.849861][T15755] blkdev_ioctl+0x1d0/0x3e0 [ 140.854356][T15755] block_ioctl+0x6d/0x80 [ 140.858636][T15755] ? blkdev_iopoll+0x70/0x70 18:53:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write(r1, &(0x7f0000000200)="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", 0x200) 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000188000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 140.863227][T15755] __se_sys_ioctl+0xcb/0x140 [ 140.867821][T15755] __x64_sys_ioctl+0x3f/0x50 [ 140.872418][T15755] do_syscall_64+0x3d/0x90 [ 140.876959][T15755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.882918][T15755] RIP: 0033:0x4663b7 [ 140.886859][T15755] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.906621][T15755] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 140.914528][T15765] loop1: detected capacity change from 0 to 264192 [ 140.915225][T15755] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 140.915246][T15755] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 140.924298][T15773] loop0: detected capacity change from 0 to 264192 [ 140.929811][T15755] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 140.952441][T15755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 140.960405][T15755] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 141.010790][T15755] loop5: detected capacity change from 0 to 264192 [ 141.020118][T15785] loop3: detected capacity change from 0 to 264192 [ 141.031224][T15755] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 141.042624][T15785] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000268000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 141.053554][T15773] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 141.063686][T15755] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 141.075745][T15765] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 141.081272][T15755] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x8c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x38d1}]}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x16}}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_REPLY={0x4}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x200, 0xffffffff, 0x2]}]}, 0x8c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0x100000314) [ 141.103596][T15785] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 141.121233][T15785] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 141.170470][T15773] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fe8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 5 (fault-call:3 fault-nth:33): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 141.217126][T15773] System zones: 0-2, 18-18, 34-35 18:53:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010075, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010024, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 141.248449][T15773] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 141.260251][T15812] loop1: detected capacity change from 0 to 264192 [ 141.270183][T15812] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000001000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000002000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 141.311087][T15823] FAULT_INJECTION: forcing a failure. [ 141.311087][T15823] name failslab, interval 1, probability 0, space 0, times 0 [ 141.323913][T15823] CPU: 1 PID: 15823 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 141.332347][T15823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.342609][T15823] Call Trace: [ 141.345883][T15823] dump_stack_lvl+0xb7/0x103 [ 141.350477][T15823] dump_stack+0x11/0x1a [ 141.354688][T15823] should_fail+0x23c/0x250 18:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000005000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 141.359208][T15823] ? __kernfs_new_node+0x6a/0x330 [ 141.364263][T15823] __should_failslab+0x81/0x90 [ 141.369028][T15823] should_failslab+0x5/0x20 [ 141.373579][T15823] kmem_cache_alloc+0x46/0x2e0 [ 141.378345][T15823] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 141.384303][T15823] __kernfs_new_node+0x6a/0x330 [ 141.385929][T15836] loop1: detected capacity change from 0 to 264192 [ 141.389172][T15823] ? ___cache_free+0x3c/0x300 [ 141.389196][T15823] ? kfree+0xf0/0x1d0 [ 141.397079][T15836] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 141.400636][T15823] kernfs_create_dir_ns+0x5e/0x140 [ 141.400662][T15823] internal_create_group+0x138/0x850 [ 141.400683][T15823] ? __invalidate_device+0xb0/0xc0 [ 141.426765][T15823] ? set_disk_ro+0x73/0x110 [ 141.431338][T15823] sysfs_create_group+0x1b/0x20 [ 141.436177][T15823] loop_configure+0xbcd/0xeb0 [ 141.440843][T15823] lo_ioctl+0x59b/0x1370 [ 141.445080][T15823] ? path_openat+0x18c3/0x1e90 [ 141.449853][T15823] ? putname+0xc6/0xe0 [ 141.453907][T15823] ? ___cache_free+0x3c/0x300 18:53:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008002000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008003000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 141.458662][T15823] ? blkdev_common_ioctl+0x405/0x10a0 [ 141.464031][T15823] ? selinux_file_ioctl+0x8e0/0x970 [ 141.469257][T15823] ? lo_release+0x120/0x120 [ 141.473838][T15823] blkdev_ioctl+0x1d0/0x3e0 [ 141.478364][T15823] block_ioctl+0x6d/0x80 [ 141.482586][T15823] ? blkdev_iopoll+0x70/0x70 [ 141.487159][T15823] __se_sys_ioctl+0xcb/0x140 [ 141.491733][T15823] __x64_sys_ioctl+0x3f/0x50 [ 141.496324][T15823] do_syscall_64+0x3d/0x90 [ 141.500787][T15823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.507904][T15823] RIP: 0033:0x4663b7 [ 141.512049][T15823] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.531684][T15823] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 141.540092][T15823] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 141.548047][T15823] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 141.556546][T15823] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 141.564503][T15823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 141.572476][T15823] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 141.580627][T15823] loop5: detected capacity change from 0 to 264192 [ 141.589077][T15823] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 141.607970][T15852] loop0: detected capacity change from 0 to 264192 [ 141.638382][T15862] loop3: detected capacity change from 0 to 264192 [ 141.638567][T15852] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 141.661060][T15862] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 141.676288][T15852] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 141.676630][T15862] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 141.684410][T15852] System zones: 0-2, 18-18, 34-35 [ 141.701873][T15862] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 141.708023][T15852] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 141.719073][T15862] EXT4-fs mount: 53 callbacks suppressed [ 141.719105][T15862] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 141.730104][T15852] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 141.762875][T15823] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 141.780989][T15823] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 141.793178][T15823] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x7, 0x3, 0x7, 0x55, 0x0, 0xea38, 0xc0410, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext, 0x415, 0x2, 0x5, 0x6, 0x7, 0x100, 0x8001, 0x0, 0x8, 0x0, 0x20}, r2, 0xd, r1, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000436000/0x14000)=nil, 0x14000, 0x2000000, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @loopback}, &(0x7f0000000100)=0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'syztnl2\x00', r4, 0x0, 0x700, 0x4, 0x9, {{0xa, 0x4, 0x2, 0x4, 0x28, 0x67, 0x0, 0x3b, 0x29, 0x0, @multicast2, @rand_addr=0x64010100, {[@end, @ssrr={0x89, 0x13, 0x3f, [@dev={0xac, 0x14, 0x14, 0x24}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3d}, @empty]}]}}}}}) 18:53:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010076, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010025, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:22 executing program 5 (fault-call:3 fault-nth:34): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, 0x0) [ 141.930275][T15888] loop1: detected capacity change from 0 to 264192 [ 141.938392][T15890] loop0: detected capacity change from 0 to 264192 [ 141.947869][T15889] FAULT_INJECTION: forcing a failure. [ 141.947869][T15889] name failslab, interval 1, probability 0, space 0, times 0 [ 141.960740][T15889] CPU: 0 PID: 15889 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 141.969148][T15889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.979278][T15889] Call Trace: [ 141.982556][T15889] dump_stack_lvl+0xb7/0x103 [ 141.987143][T15889] dump_stack+0x11/0x1a [ 141.991380][T15889] should_fail+0x23c/0x250 [ 141.995962][T15889] ? __kernfs_new_node+0x6a/0x330 [ 142.000986][T15889] __should_failslab+0x81/0x90 [ 142.005734][T15889] should_failslab+0x5/0x20 [ 142.010221][T15889] kmem_cache_alloc+0x46/0x2e0 [ 142.014984][T15889] ? __cond_resched+0x11/0x40 [ 142.019670][T15889] __kernfs_new_node+0x6a/0x330 [ 142.024600][T15889] ? __down_write_common+0x42/0x810 [ 142.029961][T15889] ? idr_alloc_cyclic+0x249/0x2d0 [ 142.034982][T15889] ? __down_write_common+0x42/0x810 [ 142.040163][T15889] ? rb_insert_color+0x7e/0x310 [ 142.045017][T15889] kernfs_new_node+0x5b/0xd0 [ 142.049690][T15889] __kernfs_create_file+0x45/0x1a0 [ 142.054858][T15889] sysfs_add_file_mode_ns+0x1c1/0x250 [ 142.060213][T15889] internal_create_group+0x2e4/0x850 [ 142.065483][T15889] sysfs_create_group+0x1b/0x20 [ 142.070589][T15889] loop_configure+0xbcd/0xeb0 [ 142.075252][T15889] lo_ioctl+0x59b/0x1370 [ 142.079492][T15889] ? path_openat+0x18c3/0x1e90 [ 142.084258][T15889] ? putname+0xc6/0xe0 [ 142.088321][T15889] ? ___cache_free+0x3c/0x300 [ 142.092993][T15889] ? blkdev_common_ioctl+0x405/0x10a0 [ 142.098438][T15889] ? selinux_file_ioctl+0x8e0/0x970 [ 142.103644][T15889] ? lo_release+0x120/0x120 [ 142.108141][T15889] blkdev_ioctl+0x1d0/0x3e0 [ 142.112716][T15889] block_ioctl+0x6d/0x80 [ 142.116941][T15889] ? blkdev_iopoll+0x70/0x70 [ 142.121523][T15889] __se_sys_ioctl+0xcb/0x140 [ 142.126093][T15889] __x64_sys_ioctl+0x3f/0x50 [ 142.130771][T15889] do_syscall_64+0x3d/0x90 [ 142.135269][T15889] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.141422][T15889] RIP: 0033:0x4663b7 [ 142.145296][T15889] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.165145][T15889] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 142.173699][T15889] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 142.181650][T15889] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 142.189926][T15889] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 142.197882][T15889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 142.206235][T15889] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 18:53:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, 0x0) 18:53:22 executing program 2: unshare(0x40000400) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x40401, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x227c, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x1, 0x5) syz_open_dev$rtc(&(0x7f00000001c0), 0x2, 0x80000) fstat(r1, &(0x7f0000000000)) [ 142.234033][T15890] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 142.238918][T15889] loop5: detected capacity change from 0 to 264192 [ 142.260480][T15899] loop3: detected capacity change from 0 to 264192 [ 142.267855][T15890] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 142.276171][T15890] System zones: 0-2, 18-18, 34-35 18:53:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008005000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 142.285855][T15890] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 142.297109][T15890] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 142.313207][T15889] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 142.326821][T15899] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010077, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 142.336287][T15919] loop1: detected capacity change from 0 to 264192 [ 142.343603][T15899] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 142.361197][T15899] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 142.373673][T15899] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008006000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x44) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r1 = inotify_init1(0x0) preadv(r0, &(0x7f0000000f80), 0x0, 0x20, 0x1800000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x158) inotify_add_watch(r1, &(0x7f0000000040)='./file0/bus\x00', 0x43000570) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0/bus\x00', 0x6, 0x8, &(0x7f0000000e00)=[{&(0x7f0000000900)="e9aa2916060b2c18032353c10db18423bcb5f04e32c58e4e007fdeaa913790ccd1099f4a094108b219", 0x29, 0x7f}, {&(0x7f0000000940)="1381ba8af8e965d899c345ecd1b81c48382c7308341baf3ee78ce53fe8a8d4c0625cb5b47045ef3001eb5c7493ba63696e38db1af44ed5673a39e5b2bb7b5112558cbd1006350002021aa8dd", 0x4c, 0x1}, {&(0x7f00000009c0)="9917df83e07b16a731fe7173b96b677f09253803096bcaea846d55c8ad4d5432c891b6495a77d1e8c3b032f00688dcda3f3a54083dbbe9bcd7713984ad697533272ce46cdaefae8b496c0ca9b3292db2f2bfc35d1792b93800160079bfca9efe", 0x60, 0x10000}, {&(0x7f0000000a40)="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", 0xfd, 0x80}, {&(0x7f0000000b40)="4c02565a61963eb1f00a137341957283967c99d2a388c09989c4d0d9cc252be994c8d796c4e775c64c0b985adf46abcc2e708e651405df92a284523ea66f6482246953057db4c9a3b98358065c0769b116c93c1a8799e2381e33de8ccd5d3724ec632580106c4d2f53ea211876e9939f2e5e661a16dd91720ebcb727d2248c9a29e5d9aed3ff41fcbf0ad9b6d53a992feb36f99e16e859808c2fb77a4f0af844df92944986f131a5054b12b8e821fd74a075b6d1e281063e03d1ec73a04c5bc7ea0dac41a69def19dac22d60657a2738f7792e974376a158d626035c1b018db07826d7e370c8c5e9064aa7e10570c5e75170554086bbfb8e6a0fc3aa7ef7", 0xfe, 0x1}, {&(0x7f0000000c40)="11a389ad9a5c2c87a30c07c7ddb89fb4d9672675a13d0479ca714cc2d1d1a10f5e727c70fbfd5587369a5f11c0ac4371b4960110b917410e09745dbeee34ec7ca7bf1893b885ccfd710e62f71eb8b16736cf83a1d085fa6655ae783305a807677af4714c21f184eec7f26a4e6071c95001a0889ca9de943394b1483c87975707282865f30aef51c8b80fd4ce20dfcb91cd", 0x91, 0x344}, {&(0x7f0000000d00)="ce32e05d542dd40a1a8e7cd4f201208b90b510ef68ab37699d3418d23481442fc1b76741a148df3fd26eee20b108b0b2519861cdd810266926bf8dc8af8b24557f7cf6c9537d0122f8f828f9d4a556265a5cd32f51d0e14043a1ea91b2050806827314efbadf7fe4d209efaeaa902da91137f84f7a4e", 0x76}, {&(0x7f0000000d80)="90e789b9f50827fdd3ae80a9e9046c3291eea63f974b50872faaa8705f650dedf3d5cd66ed2857eda853477fa4e638e4d2d93276dbc61cd0ec1ff692db84d26f5a654e781947a5e7c08eb543c78fd8d845f4ccd74c8f27137d351dfbbda919b1873325f636b0c5c8ed943504bddbdf61e0b9cbedac5de7bbcaea454995c12c3a", 0x80, 0x8}], 0x4000, &(0x7f0000000ec0)={[{@nonumtail}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@numtail}, {@uni_xlate}, {@rodir}, {@shortname_mixed}, {@rodir}, {@shortname_win95}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@smackfstransmute}]}) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x6000389) close(r1) inotify_add_watch(r0, &(0x7f0000000f80)='./file0/bus\x00', 0x80000000) rmdir(&(0x7f0000000080)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800001, 0x12, r2, 0xef696000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$sock(r2, &(0x7f0000000840)={&(0x7f00000000c0)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000280)="a8e2914e4bbbfcfab725712b21d3a6b7d6734f357a93eaa015094d2cd1eaef5d8abcaa14a66e3ff4274f9bb7b2bd098645e7b626c0d0ab1aa233f216153dac9467ae680af99d732a4ca32a1ead3c2423b599ff2768635255a572f2c0335b61e6e4c1ab6803f7f28400fec75d156acb0f5f69802d08cf4b53acbe15396f7fdff84084675be0ef4fc043595388fa0fda61261fdd4b2fe95b0e8d5ccce00de3971bc9640a727eb583a8693707180b6044", 0xaf}, {&(0x7f00000001c0)="f2ab0f76b4df64adc021498d3e45458e9a686c6de708c6faf813e119cac268875847c4911a12e44ad7a3cd0a5ba6ee40e41ec644d1ad3ce40d2cfd82e6f18083b8ffe960597ea28306606718493c4a889863d991c4259e4d9f3631fdd384d776c0832cc933be", 0x66}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000440)="a6272fc124c300f3edd85d4c0cb85210f8de7a04447dc873d6a73d6fda117de0cd89e304069699dce4c808a0e6f788c47b7bc1600b9e401ce70e5f95d18ffb910bd2ca04d51ef377a922f584797b7e77f5c3c7bbaa895f39c91d5bbfcf3a0a92609e5ef9c55fde6c3f281ddc171d022e59c1d34d4904", 0x76}, {&(0x7f00000004c0)="5908cf3b848fa29271f28be33c9f0dd3bf485e0c9f74bd603d77a7ae22b7b521273ef466e3a0e63bd774908065e58ac3937a079b020258b0021c61d2be5f4c051147ae0f00b774b1665de705975b428aecfc91327654e7d770075e34c804037faae126b22c956df6150c67dee9cf5de93b5da6df9de9a9792f31ebd9b7112c8ac4a0db1cb31acc0721db0abadc7cd131c36c5ccf9178a46fb909498ce72b884b349cef671f9d9ce89bab8560eb6c0858f46e8141884d62edf98665eaf7161d95e3b268f9649a0ccadbe2daa948", 0xcd}, {&(0x7f00000005c0)="4be8f15af62d49304204c7d75af56a372d4fbfb8386ae773543b7dae3e5a214358086b0ab6a5447fbe4fa77b57c83bd8c02d3f533459d454fc3455d16e075eb64df22d77142462f2d13961d6785473b79d3cc9265e230c6348414930749d9e964d0cd9e9eef712734aae76e430faf901316ba3e27ac00c7940419be6dbd4929404a2b19c7e9f1252ff9d041f640211914b8571b94cac74b242fb075f50ea04d90fbd6f212675acae2b348b69a701fad4f9e3dba739", 0xb5}, {&(0x7f0000000680)="7037e0ebbc3cf66b6a884ce6d25047ba70477b2577ff0cedd3a6226e5d1560b1be136f2770898a3a888cbaf67749d29c6ce2788c58ca35e748506401b3fa6488788fb626af8f30adf94b861e18ab999f47577910ecdf43c8a33271a2036dd3706003288ad84de34294795b780b4962c5ed5980fb76b130c981c8e27c889673ce63c3553d1533ad04e0601337dcf9d450165c40f3118aef6c16e2c4bc73a62f35bcd60f7fc9effe95ad22b644a4d618", 0xaf}], 0x7, &(0x7f00000007c0)=[@txtime={{0x18, 0x1, 0x3d, 0x528}}, @txtime={{0x18, 0x1, 0x3d, 0x735}}, @timestamping={{0x14, 0x1, 0x25, 0x2003}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x60}, 0x40010) [ 142.420079][T15889] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 142.437864][T15889] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 142.450285][T15889] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, 0x0) 18:53:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010026, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 142.512837][T15945] loop0: detected capacity change from 0 to 264192 18:53:23 executing program 5 (fault-call:3 fault-nth:35): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:23 executing program 2: mount$9p_fd(0x0, &(0x7f0000000240)='.\x00', &(0x7f0000000280), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472618e7b3d66", @ANYBLOB=',loose,cache=mmap,version=9p2000']) 18:53:23 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x402040, 0x41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x20000, 0x0) [ 142.554971][T15945] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 142.583809][T15958] loop3: detected capacity change from 0 to 264192 18:53:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008007000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 142.653733][T15945] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 142.654406][T15974] loop1: detected capacity change from 0 to 264192 [ 142.662287][T15958] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 142.686372][T15981] FAULT_INJECTION: forcing a failure. [ 142.686372][T15981] name failslab, interval 1, probability 0, space 0, times 0 [ 142.699017][T15981] CPU: 1 PID: 15981 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 142.707433][T15981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.715799][T15945] System zones: [ 142.717659][T15981] Call Trace: [ 142.717668][T15981] dump_stack_lvl+0xb7/0x103 [ 142.717691][T15981] dump_stack+0x11/0x1a [ 142.721215][T15945] 0-2 [ 142.724479][T15981] should_fail+0x23c/0x250 [ 142.724511][T15981] ? __kernfs_new_node+0x6a/0x330 [ 142.729106][T15945] , 18-18 [ 142.733245][T15981] __should_failslab+0x81/0x90 [ 142.735852][T15945] , 34-35 [ 142.740259][T15981] should_failslab+0x5/0x20 [ 142.745290][T15945] [ 142.748173][T15981] kmem_cache_alloc+0x46/0x2e0 [ 142.760873][T15958] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 142.762638][T15981] ? __down_write_common+0x42/0x810 [ 142.767451][T15958] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:23 executing program 2: ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x227c, &(0x7f0000000080)) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000100)) r1 = clone3(&(0x7f0000000500)={0x140105000, &(0x7f0000000000), 0x0, 0x0, {}, &(0x7f00000000c0)=""/34, 0x22, 0x0, 0x0}, 0x58) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pidfd_open(r1, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r2, 0x8008f512, &(0x7f0000000040)) 18:53:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008008000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 142.784900][T15981] __kernfs_new_node+0x6a/0x330 [ 142.784930][T15981] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 142.790195][T15958] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 142.802305][T15981] ? up_write+0x25/0xc0 [ 142.824560][T15945] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 142.827276][T15981] kernfs_new_node+0x5b/0xd0 [ 142.827308][T15981] __kernfs_create_file+0x45/0x1a0 18:53:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010027, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01007a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 142.838412][T15945] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 142.858677][T15981] sysfs_add_file_mode_ns+0x1c1/0x250 [ 142.864103][T15981] internal_create_group+0x2e4/0x850 [ 142.869759][T15981] ? set_disk_ro+0x73/0x110 [ 142.874350][T15981] sysfs_create_group+0x1b/0x20 [ 142.879260][T15981] loop_configure+0xbcd/0xeb0 [ 142.883963][T15981] lo_ioctl+0x59b/0x1370 [ 142.888265][T15981] ? path_openat+0x18c3/0x1e90 [ 142.893194][T15981] ? putname+0xc6/0xe0 [ 142.897290][T15981] ? ___cache_free+0x3c/0x300 18:53:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800a000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 142.901992][T15981] ? blkdev_common_ioctl+0x405/0x10a0 [ 142.907363][T15981] ? selinux_file_ioctl+0x8e0/0x970 [ 142.912646][T15981] ? lo_release+0x120/0x120 [ 142.917148][T15981] blkdev_ioctl+0x1d0/0x3e0 [ 142.921653][T15981] block_ioctl+0x6d/0x80 [ 142.925889][T15981] ? blkdev_iopoll+0x70/0x70 [ 142.930478][T15981] __se_sys_ioctl+0xcb/0x140 [ 142.935060][T15981] __x64_sys_ioctl+0x3f/0x50 [ 142.939641][T15981] do_syscall_64+0x3d/0x90 [ 142.944052][T15981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.950060][T15981] RIP: 0033:0x4663b7 18:53:23 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_mount_image$tmpfs(&(0x7f0000001940), &(0x7f0000001980)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@uid={'uid', 0x3d, r0}}, {@huge_within_size}, {@uid={'uid', 0x3d, r0}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x67, 0x70]}}, {@mode={'mode', 0x3d, 0x6}}, {@uid={'uid', 0x3d, r2}}, {@huge_always}, {@size={'size', 0x3d, [0x36, 0x38, 0x74]}}]}) utime(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) 18:53:23 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 142.953954][T15981] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.973651][T15981] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 142.982214][T15981] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 142.982234][T15981] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 18:53:23 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:23 executing program 5 (fault-call:3 fault-nth:36): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 142.982248][T15981] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 142.982262][T15981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 142.982275][T15981] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 142.994458][T15981] loop5: detected capacity change from 0 to 264192 [ 143.023306][T15981] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 143.024121][T15981] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 143.024170][T15981] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 143.024196][T15981] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 143.027875][T16015] FAULT_INJECTION: forcing a failure. [ 143.027875][T16015] name failslab, interval 1, probability 0, space 0, times 0 18:53:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800b000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 143.027901][T16015] CPU: 0 PID: 16015 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 143.027924][T16015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.027936][T16015] Call Trace: [ 143.027943][T16015] dump_stack_lvl+0xb7/0x103 [ 143.027967][T16015] dump_stack+0x11/0x1a [ 143.028033][T16015] should_fail+0x23c/0x250 [ 143.028063][T16015] ? __se_sys_memfd_create+0xfb/0x390 [ 143.028090][T16015] __should_failslab+0x81/0x90 [ 143.028107][T16015] should_failslab+0x5/0x20 [ 143.028127][T16015] __kmalloc+0x66/0x340 [ 143.028144][T16015] ? strnlen_user+0x137/0x1c0 [ 143.028169][T16015] __se_sys_memfd_create+0xfb/0x390 [ 143.028262][T16015] __x64_sys_memfd_create+0x2d/0x40 [ 143.028279][T16015] do_syscall_64+0x3d/0x90 [ 143.028301][T16015] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.028326][T16015] RIP: 0033:0x4665f9 [ 143.028337][T16015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.028353][T16015] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 143.028372][T16015] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 143.028384][T16015] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 [ 143.028410][T16015] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff [ 143.028424][T16015] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 143.028437][T16015] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 143.063453][T16016] tmpfs: Unsupported parameter 'huge' [ 143.090881][T16023] FAULT_INJECTION: forcing a failure. [ 143.090881][T16023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.119133][T16022] loop3: detected capacity change from 0 to 264192 [ 143.126410][T16023] CPU: 0 PID: 16023 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 143.250724][T16037] tmpfs: Unsupported parameter 'huge' [ 143.251161][T16023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:53:23 executing program 2: r0 = io_uring_setup(0x7fd9, &(0x7f00000009c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x227c, &(0x7f0000000080)) preadv(r3, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/188, 0xbc}, {&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000040)}, {&(0x7f0000000300)=""/61, 0x3d}], 0x5, 0x7, 0x7fff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 143.251174][T16023] Call Trace: [ 143.251180][T16023] dump_stack_lvl+0xb7/0x103 [ 143.251203][T16023] dump_stack+0x11/0x1a [ 143.353420][T16023] should_fail+0x23c/0x250 [ 143.357846][T16023] should_fail_usercopy+0x16/0x20 [ 143.362929][T16023] _copy_from_user+0x1c/0xd0 [ 143.367529][T16023] __se_sys_memfd_create+0x137/0x390 [ 143.372877][T16023] __x64_sys_memfd_create+0x2d/0x40 [ 143.378077][T16023] do_syscall_64+0x3d/0x90 [ 143.382672][T16023] entry_SYSCALL_64_after_hwframe+0x44/0xae 18:53:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) uselib(&(0x7f0000000040)='./file0\x00') preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x87e) readv(r2, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) close(0xffffffffffffffff) sendto(r1, &(0x7f00000003c0)="76dfd0d97898421003f461d6e877729f6b01824d8b20a3f076a391e065f352f8b212a0b508a629e1f9539aa3fd117c44640d356ec96b9311f1e4f4ee4cc25a8fd65d5bcebf207085cb5b8f79b93b779be608f3c564e87148c7b075c15a3db229f0d635765c0373ea099ffd138f87801d3dbe60cd0ca33561a2103ac3db31567ae96680e1f43e9cd60c27eab81c932f3da175df88cc90d95f5d5ccdc757030ed826707e9abc1b6d3558f0132a3c", 0xad, 0x0, &(0x7f0000000080)=@qipcrtr={0x2a, 0xffffffff, 0x7fff}, 0x80) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 143.388575][T16023] RIP: 0033:0x4665f9 [ 143.392466][T16023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.412869][T16023] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 143.421291][T16023] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 143.429277][T16023] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 [ 143.437259][T16023] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff [ 143.445980][T16023] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 143.453951][T16023] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 143.466461][T16022] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 143.466965][T16024] loop0: detected capacity change from 0 to 264192 18:53:24 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008018000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 143.484374][T16022] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 143.502138][T16022] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 143.514324][T16022] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 143.576000][T16065] FAULT_INJECTION: forcing a failure. [ 143.576000][T16065] name failslab, interval 1, probability 0, space 0, times 0 [ 143.588653][T16065] CPU: 1 PID: 16065 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 143.597092][T16065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.607144][T16065] Call Trace: [ 143.610417][T16065] dump_stack_lvl+0xb7/0x103 [ 143.615077][T16065] dump_stack+0x11/0x1a [ 143.619310][T16065] should_fail+0x23c/0x250 [ 143.623771][T16065] ? __kernfs_new_node+0x6a/0x330 [ 143.628916][T16065] __should_failslab+0x81/0x90 [ 143.633604][T16024] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 143.633684][T16065] should_failslab+0x5/0x20 [ 143.646753][T16024] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 143.647333][T16065] kmem_cache_alloc+0x46/0x2e0 [ 143.655427][T16024] System zones: [ 143.660028][T16065] ? __down_write_common+0x42/0x810 [ 143.660052][T16065] __kernfs_new_node+0x6a/0x330 [ 143.663611][T16024] 0-2 [ 143.668866][T16065] ? up_write+0x25/0xc0 [ 143.668886][T16065] kernfs_new_node+0x5b/0xd0 [ 143.673735][T16024] , 18-18 [ 143.676286][T16065] __kernfs_create_file+0x45/0x1a0 [ 143.680844][T16024] , 34-35 [ 143.685405][T16065] sysfs_add_file_mode_ns+0x1c1/0x250 [ 143.688330][T16024] [ 143.689602][T16024] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 143.693416][T16065] internal_create_group+0x2e4/0x850 [ 143.693450][T16065] ? set_disk_ro+0x73/0x110 [ 143.696397][T16024] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 143.701713][T16065] sysfs_create_group+0x1b/0x20 [ 143.729372][T16068] FAULT_INJECTION: forcing a failure. [ 143.729372][T16068] name failslab, interval 1, probability 0, space 0, times 0 [ 143.735233][T16065] loop_configure+0xbcd/0xeb0 [ 143.735264][T16065] lo_ioctl+0x59b/0x1370 [ 143.761687][T16065] ? path_openat+0x18c3/0x1e90 [ 143.766496][T16065] ? putname+0xc6/0xe0 [ 143.770565][T16065] ? ___cache_free+0x3c/0x300 [ 143.775249][T16065] ? blkdev_common_ioctl+0x405/0x10a0 [ 143.780682][T16065] ? selinux_file_ioctl+0x8e0/0x970 [ 143.785883][T16065] ? lo_release+0x120/0x120 [ 143.790379][T16065] blkdev_ioctl+0x1d0/0x3e0 [ 143.794869][T16065] block_ioctl+0x6d/0x80 [ 143.799102][T16065] ? blkdev_iopoll+0x70/0x70 [ 143.803692][T16065] __se_sys_ioctl+0xcb/0x140 [ 143.808270][T16065] __x64_sys_ioctl+0x3f/0x50 [ 143.812956][T16065] do_syscall_64+0x3d/0x90 [ 143.817380][T16065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.823271][T16065] RIP: 0033:0x4663b7 [ 143.827209][T16065] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.846846][T16065] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.858380][T16065] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 143.866339][T16065] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 143.874297][T16065] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 143.882252][T16065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 143.890230][T16065] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 143.898227][T16068] CPU: 0 PID: 16068 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 143.906643][T16068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.916697][T16068] Call Trace: [ 143.919967][T16068] dump_stack_lvl+0xb7/0x103 18:53:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010028, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 143.924707][T16068] dump_stack+0x11/0x1a [ 143.928866][T16068] should_fail+0x23c/0x250 [ 143.933297][T16068] ? shmem_alloc_inode+0x22/0x30 [ 143.938240][T16068] __should_failslab+0x81/0x90 [ 143.943185][T16068] ? shmem_match+0xa0/0xa0 [ 143.947626][T16068] should_failslab+0x5/0x20 [ 143.949103][T16065] loop5: detected capacity change from 0 to 264192 [ 143.952193][T16068] kmem_cache_alloc+0x46/0x2e0 [ 143.963487][T16068] ? shmem_match+0xa0/0xa0 [ 143.967903][T16068] shmem_alloc_inode+0x22/0x30 [ 143.972668][T16068] new_inode_pseudo+0x38/0x1c0 [ 143.977451][T16068] new_inode+0x21/0x120 [ 143.981709][T16068] shmem_get_inode+0xa1/0x490 [ 143.986382][T16068] __shmem_file_setup+0xf1/0x1d0 [ 143.991323][T16068] shmem_file_setup+0x37/0x40 [ 143.995998][T16068] __se_sys_memfd_create+0x1eb/0x390 [ 144.001292][T16068] __x64_sys_memfd_create+0x2d/0x40 [ 144.006493][T16068] do_syscall_64+0x3d/0x90 [ 144.010996][T16068] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.017130][T16068] RIP: 0033:0x4665f9 18:53:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000801c000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 144.021112][T16068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.024563][T16065] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 144.040801][T16068] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 144.040824][T16068] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 144.040836][T16068] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 18:53:24 executing program 2: fork() r0 = fork() prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ptrace(0x8, r0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) [ 144.040848][T16068] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff [ 144.040860][T16068] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 144.058858][T16065] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 144.066294][T16068] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 144.115812][T16065] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:24 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008026000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:24 executing program 5 (fault-call:3 fault-nth:37): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 144.127992][T16065] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080fe000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 144.191337][T16099] FAULT_INJECTION: forcing a failure. [ 144.191337][T16099] name failslab, interval 1, probability 0, space 0, times 0 [ 144.203973][T16099] CPU: 1 PID: 16099 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 144.212432][T16099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.222489][T16099] Call Trace: [ 144.225766][T16099] dump_stack_lvl+0xb7/0x103 [ 144.230387][T16099] dump_stack+0x11/0x1a [ 144.232395][T16101] loop0: detected capacity change from 0 to 264192 18:53:24 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xa7, 0x3, 0x9, 0x6, 0x0, 0x7, 0x7041, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp, 0x8, 0x91, 0x6, 0x4, 0x3, 0xcf, 0x0, 0x0, 0x2, 0x0, 0x5}, r1, 0x9, r0, 0x1) 18:53:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004020006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 144.234622][T16099] should_fail+0x23c/0x250 [ 144.234652][T16099] ? security_inode_alloc+0x30/0x180 [ 144.246698][T16111] loop3: detected capacity change from 0 to 264192 [ 144.250830][T16099] __should_failslab+0x81/0x90 [ 144.250855][T16099] should_failslab+0x5/0x20 [ 144.266749][T16099] kmem_cache_alloc+0x46/0x2e0 [ 144.271525][T16099] security_inode_alloc+0x30/0x180 [ 144.276715][T16099] inode_init_always+0x20d/0x440 [ 144.281663][T16099] ? shmem_match+0xa0/0xa0 [ 144.286081][T16099] new_inode_pseudo+0x73/0x1c0 [ 144.290853][T16099] new_inode+0x21/0x120 [ 144.295111][T16099] shmem_get_inode+0xa1/0x490 [ 144.299792][T16099] __shmem_file_setup+0xf1/0x1d0 [ 144.304741][T16099] shmem_file_setup+0x37/0x40 [ 144.310201][T16099] __se_sys_memfd_create+0x1eb/0x390 [ 144.315488][T16099] __x64_sys_memfd_create+0x2d/0x40 [ 144.320685][T16099] do_syscall_64+0x3d/0x90 [ 144.325104][T16099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.331084][T16099] RIP: 0033:0x4665f9 [ 144.334978][T16099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.354760][T16099] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 144.359546][T16130] FAULT_INJECTION: forcing a failure. [ 144.359546][T16130] name failslab, interval 1, probability 0, space 0, times 0 [ 144.363174][T16099] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 144.363191][T16099] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 [ 144.363203][T16099] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff [ 144.363216][T16099] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 144.407843][T16099] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 144.416261][T16130] CPU: 0 PID: 16130 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 144.424750][T16130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.434891][T16130] Call Trace: [ 144.438316][T16130] dump_stack_lvl+0xb7/0x103 [ 144.442924][T16130] dump_stack+0x11/0x1a [ 144.447091][T16130] should_fail+0x23c/0x250 [ 144.451601][T16130] ? __kernfs_new_node+0x6a/0x330 [ 144.456671][T16130] __should_failslab+0x81/0x90 [ 144.461456][T16130] should_failslab+0x5/0x20 [ 144.466015][T16130] kmem_cache_alloc+0x46/0x2e0 [ 144.470781][T16130] ? __down_write_common+0x42/0x810 [ 144.475979][T16130] __kernfs_new_node+0x6a/0x330 [ 144.480912][T16130] ? up_write+0x25/0xc0 [ 144.485075][T16130] kernfs_new_node+0x5b/0xd0 [ 144.489675][T16130] __kernfs_create_file+0x45/0x1a0 [ 144.494803][T16130] sysfs_add_file_mode_ns+0x1c1/0x250 [ 144.500173][T16130] internal_create_group+0x2e4/0x850 [ 144.505519][T16130] ? set_disk_ro+0x73/0x110 [ 144.510030][T16130] sysfs_create_group+0x1b/0x20 [ 144.514881][T16130] loop_configure+0xbcd/0xeb0 [ 144.519578][T16130] lo_ioctl+0x59b/0x1370 [ 144.523824][T16130] ? path_openat+0x18c3/0x1e90 [ 144.528599][T16130] ? putname+0xc6/0xe0 [ 144.532669][T16130] ? ___cache_free+0x3c/0x300 [ 144.537349][T16130] ? blkdev_common_ioctl+0x405/0x10a0 [ 144.542754][T16130] ? selinux_file_ioctl+0x8e0/0x970 [ 144.545697][T16111] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 144.548049][T16130] ? lo_release+0x120/0x120 [ 144.557248][T16101] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 144.561639][T16130] blkdev_ioctl+0x1d0/0x3e0 [ 144.575325][T16130] block_ioctl+0x6d/0x80 [ 144.579652][T16130] ? blkdev_iopoll+0x70/0x70 [ 144.584466][T16130] __se_sys_ioctl+0xcb/0x140 [ 144.589051][T16130] __x64_sys_ioctl+0x3f/0x50 [ 144.593141][T16111] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 144.593814][T16130] do_syscall_64+0x3d/0x90 [ 144.593849][T16130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.611307][T16111] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 144.615663][T16130] RIP: 0033:0x4663b7 18:53:25 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000030006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 144.615682][T16130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.615698][T16130] RSP: 002b:00007f8189cc1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.615715][T16130] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 144.621591][T16111] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 144.633783][T16130] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 144.633799][T16130] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 144.640011][T16101] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 144.657245][T16130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 144.657263][T16130] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 144.672298][T16147] FAULT_INJECTION: forcing a failure. [ 144.672298][T16147] name failslab, interval 1, probability 0, space 0, times 0 [ 144.687340][T16101] System zones: [ 144.692197][T16147] CPU: 0 PID: 16147 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 144.700210][T16101] 0-2 [ 144.708138][T16147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.708151][T16147] Call Trace: [ 144.708158][T16147] dump_stack_lvl+0xb7/0x103 [ 144.708180][T16147] dump_stack+0x11/0x1a [ 144.716364][T16101] , 18-18 [ 144.724309][T16147] should_fail+0x23c/0x250 [ 144.736878][T16101] , 34-35 [ 144.740402][T16147] ? __d_alloc+0x36/0x370 [ 144.748862][T16101] [ 144.751415][T16147] __should_failslab+0x81/0x90 [ 144.763992][T16101] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 144.764729][T16147] should_failslab+0x5/0x20 [ 144.769301][T16101] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 144.773450][T16147] kmem_cache_alloc+0x46/0x2e0 [ 144.800852][T16130] loop5: detected capacity change from 0 to 264192 [ 144.806468][T16147] ? __init_rwsem+0x59/0x70 [ 144.806496][T16147] __d_alloc+0x36/0x370 [ 144.841662][T16147] ? current_time+0xdb/0x190 [ 144.846307][T16147] d_alloc_pseudo+0x1a/0x50 [ 144.850825][T16147] alloc_file_pseudo+0x63/0x130 [ 144.855684][T16147] __shmem_file_setup+0x14c/0x1d0 [ 144.860714][T16147] shmem_file_setup+0x37/0x40 [ 144.865413][T16147] __se_sys_memfd_create+0x1eb/0x390 [ 144.870701][T16147] __x64_sys_memfd_create+0x2d/0x40 [ 144.875909][T16147] do_syscall_64+0x3d/0x90 [ 144.880352][T16147] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.886267][T16147] RIP: 0033:0x4665f9 18:53:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010029, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010118, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)=0x5, 0x8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x9, 0x70000000, 0x800}) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0802020100000000fc0200000000000000000001"], 0x18) r1 = socket$netlink(0x10, 0x3, 0x8) dup2(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000180)=""/36) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002400000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x23d, 0x11580}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="5e04949f88690f879f1571e9a572c200"]) 18:53:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008002040006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 144.890153][T16147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.910174][T16147] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 144.918627][T16147] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 144.926601][T16147] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 [ 144.934811][T16147] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff [ 144.942781][T16147] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 144.950743][T16147] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 144.963653][T16130] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 144.975535][T16130] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, r1, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000094) r2 = syz_io_uring_setup(0x3f3b, &(0x7f0000000240)={0x0, 0xdf2e, 0x20, 0x1, 0x2af}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000300)) fallocate(r2, 0x41, 0x401, 0x1) syz_io_uring_setup(0x1ba, &(0x7f0000000340)={0x0, 0x613e, 0x2, 0x0, 0x48, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000400)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000440)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0xbad, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffff4e) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000480), 0x19dc03, 0x0) dup(r5) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x169000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r6, 0x9205) r7 = openat(r0, &(0x7f0000000500)='./file0\x00', 0x402040, 0x210) r8 = dup2(r5, r5) sendmsg$BATADV_CMD_SET_MESH(r8, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x81000820}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000844}, 0x340756778c28cc6e) r9 = accept4(r0, &(0x7f0000000640)=@llc, &(0x7f00000006c0)=0x80, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@local, @in6=@local, 0x4e22, 0x4, 0x4e20, 0x7, 0xa, 0x20, 0x80, 0x0, 0x0, r10}, {0x7, 0x100000000000, 0x8, 0x1, 0x40, 0xfffffffffffffff8, 0x0, 0xffffffffffffff80}, {0x3aa, 0x100000001, 0x40, 0x5}, 0x3, 0x0, 0x2, 0x0, 0x1, 0x1}, {{@in=@loopback, 0x4d6, 0x3c}, 0x2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3501, 0x3, 0x0, 0x7, 0x88f1, 0x81, 0x1}}, 0xe8) preadv(0xffffffffffffffff, &(0x7f0000001e40)=[{&(0x7f0000000880)=""/249, 0xf9}, {&(0x7f0000000980)=""/246, 0xf6}, {&(0x7f0000000a80)=""/73, 0x49}, {&(0x7f0000000b00)=""/191, 0xbf}, {&(0x7f0000000bc0)=""/115, 0x73}, {&(0x7f0000000c40)=""/132, 0x84}, {&(0x7f0000000d00)}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/219, 0xdb}], 0x9, 0xc92, 0x3f) syz_io_uring_setup(0x1282, &(0x7f0000001f00)={0x0, 0xdf0a, 0x14, 0x3, 0x1f9}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000001f80), &(0x7f0000001fc0)=0x0) syz_io_uring_submit(r3, r11, &(0x7f0000002040)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x2, &(0x7f0000002000), 0x1, 0x1}, 0x0) [ 144.993068][T16130] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 145.005299][T16130] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:25 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 5 (fault-call:3 fault-nth:38): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008006040006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 145.073816][T16179] loop3: detected capacity change from 0 to 264192 [ 145.079649][T16184] loop0: detected capacity change from 0 to 264192 [ 145.118452][T16179] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 145.147638][T16197] FAULT_INJECTION: forcing a failure. [ 145.147638][T16197] name failslab, interval 1, probability 0, space 0, times 0 [ 145.160285][T16197] CPU: 0 PID: 16197 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 18:53:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008080040006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 145.164197][T16184] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 145.168792][T16197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.168806][T16197] Call Trace: [ 145.168812][T16197] dump_stack_lvl+0xb7/0x103 [ 145.195894][T16197] dump_stack+0x11/0x1a [ 145.195920][T16197] should_fail+0x23c/0x250 [ 145.195951][T16197] ? __alloc_file+0x2e/0x1a0 [ 145.195977][T16197] __should_failslab+0x81/0x90 [ 145.195997][T16197] should_failslab+0x5/0x20 [ 145.196019][T16197] kmem_cache_alloc+0x46/0x2e0 [ 145.196035][T16197] ? inode_doinit_with_dentry+0x382/0x950 [ 145.196055][T16197] __alloc_file+0x2e/0x1a0 [ 145.196078][T16197] alloc_empty_file+0xcd/0x1c0 [ 145.196164][T16197] alloc_file+0x3a/0x280 [ 145.196185][T16197] alloc_file_pseudo+0xe2/0x130 18:53:25 executing program 5 (fault-call:3 fault-nth:39): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010119, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000050006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 145.196207][T16197] __shmem_file_setup+0x14c/0x1d0 [ 145.196226][T16197] shmem_file_setup+0x37/0x40 [ 145.196244][T16197] __se_sys_memfd_create+0x1eb/0x390 18:53:25 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 145.196265][T16197] __x64_sys_memfd_create+0x2d/0x40 [ 145.196284][T16197] do_syscall_64+0x3d/0x90 [ 145.196359][T16197] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.196435][T16197] RIP: 0033:0x4665f9 [ 145.196449][T16197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.196469][T16197] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 145.196490][T16197] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 145.196501][T16197] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 [ 145.196513][T16197] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff [ 145.196538][T16197] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 145.196551][T16197] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 145.218650][T16184] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 145.218685][T16184] System zones: 0-2, 18-18, 34-35 [ 145.219085][T16184] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 145.219114][T16184] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 145.229933][T16208] FAULT_INJECTION: forcing a failure. [ 145.229933][T16208] name failslab, interval 1, probability 0, space 0, times 0 [ 145.229955][T16208] CPU: 1 PID: 16208 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 145.229973][T16208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.229985][T16208] Call Trace: 18:53:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000802f050006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 145.230060][T16208] dump_stack_lvl+0xb7/0x103 [ 145.230086][T16208] dump_stack+0x11/0x1a [ 145.230105][T16208] should_fail+0x23c/0x250 [ 145.230184][T16208] ? __kernfs_new_node+0x6a/0x330 [ 145.230211][T16208] __should_failslab+0x81/0x90 [ 145.230230][T16208] should_failslab+0x5/0x20 [ 145.230248][T16208] kmem_cache_alloc+0x46/0x2e0 [ 145.230263][T16208] ? __down_write_common+0x42/0x810 [ 145.230347][T16208] __kernfs_new_node+0x6a/0x330 [ 145.230375][T16208] ? up_write+0x25/0xc0 [ 145.230393][T16208] kernfs_new_node+0x5b/0xd0 [ 145.230419][T16208] __kernfs_create_file+0x45/0x1a0 [ 145.230450][T16208] sysfs_add_file_mode_ns+0x1c1/0x250 [ 145.230468][T16208] internal_create_group+0x2e4/0x850 [ 145.230502][T16208] ? set_disk_ro+0x73/0x110 [ 145.230520][T16208] sysfs_create_group+0x1b/0x20 [ 145.230540][T16208] loop_configure+0xbcd/0xeb0 [ 145.230561][T16208] lo_ioctl+0x59b/0x1370 [ 145.230605][T16208] ? path_openat+0x18c3/0x1e90 [ 145.230632][T16208] ? putname+0xc6/0xe0 [ 145.230653][T16208] ? ___cache_free+0x3c/0x300 18:53:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000060006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 145.230670][T16208] ? blkdev_common_ioctl+0x405/0x10a0 [ 145.230686][T16208] ? selinux_file_ioctl+0x8e0/0x970 [ 145.230707][T16208] ? lo_release+0x120/0x120 [ 145.230798][T16208] blkdev_ioctl+0x1d0/0x3e0 [ 145.230814][T16208] block_ioctl+0x6d/0x80 [ 145.230855][T16208] ? blkdev_iopoll+0x70/0x70 [ 145.230923][T16208] __se_sys_ioctl+0xcb/0x140 [ 145.231006][T16208] __x64_sys_ioctl+0x3f/0x50 [ 145.231023][T16208] do_syscall_64+0x3d/0x90 [ 145.231046][T16208] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.231071][T16208] RIP: 0033:0x4663b7 [ 145.231084][T16208] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.231104][T16208] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.231123][T16208] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 145.231137][T16208] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 145.231149][T16208] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 145.231177][T16208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 145.231188][T16208] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 145.231829][T16179] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 145.231879][T16179] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 145.231910][T16179] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 145.232254][T16208] loop5: detected capacity change from 0 to 264192 [ 145.284798][T16208] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 145.285383][T16208] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 145.285441][T16208] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 145.285467][T16208] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 145.381490][T16230] FAULT_INJECTION: forcing a failure. [ 145.381490][T16230] name failslab, interval 1, probability 0, space 0, times 0 [ 145.381514][T16230] CPU: 1 PID: 16230 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 145.381536][T16230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.381551][T16230] Call Trace: [ 145.381557][T16230] dump_stack_lvl+0xb7/0x103 [ 145.381647][T16230] dump_stack+0x11/0x1a [ 145.381665][T16230] should_fail+0x23c/0x250 [ 145.381688][T16230] ? __kernfs_new_node+0x6a/0x330 [ 145.381712][T16230] __should_failslab+0x81/0x90 [ 145.381729][T16230] should_failslab+0x5/0x20 [ 145.381749][T16230] kmem_cache_alloc+0x46/0x2e0 [ 145.381813][T16230] ? __down_write_common+0x42/0x810 [ 145.381882][T16230] __kernfs_new_node+0x6a/0x330 [ 145.381909][T16230] ? up_write+0x25/0xc0 [ 145.381925][T16230] kernfs_new_node+0x5b/0xd0 [ 145.381950][T16230] __kernfs_create_file+0x45/0x1a0 [ 145.381970][T16230] sysfs_add_file_mode_ns+0x1c1/0x250 [ 145.381990][T16230] internal_create_group+0x2e4/0x850 [ 145.382038][T16230] ? set_disk_ro+0x73/0x110 [ 145.382056][T16230] sysfs_create_group+0x1b/0x20 [ 145.382148][T16230] loop_configure+0xbcd/0xeb0 [ 145.382169][T16230] lo_ioctl+0x59b/0x1370 [ 145.382190][T16230] ? path_openat+0x18c3/0x1e90 [ 145.382257][T16230] ? putname+0xc6/0xe0 [ 145.382275][T16230] ? ___cache_free+0x3c/0x300 [ 145.382289][T16230] ? blkdev_common_ioctl+0x405/0x10a0 [ 145.382306][T16230] ? selinux_file_ioctl+0x8e0/0x970 [ 145.382399][T16230] ? lo_release+0x120/0x120 [ 145.382419][T16230] blkdev_ioctl+0x1d0/0x3e0 [ 145.382435][T16230] block_ioctl+0x6d/0x80 [ 145.382485][T16230] ? blkdev_iopoll+0x70/0x70 [ 145.382501][T16230] __se_sys_ioctl+0xcb/0x140 [ 145.382568][T16230] __x64_sys_ioctl+0x3f/0x50 [ 145.382585][T16230] do_syscall_64+0x3d/0x90 [ 145.382672][T16230] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.382698][T16230] RIP: 0033:0x4663b7 [ 145.382712][T16230] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.382732][T16230] RSP: 002b:00007f8189ce2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.382811][T16230] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 145.382898][T16230] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 145.382952][T16230] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 145.382988][T16230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 145.383001][T16230] R13: 0000000000000005 R14: 0000000020000290 R15: 0000000000000006 [ 145.387170][T16234] loop0: detected capacity change from 0 to 264192 [ 145.392383][T16230] loop5: detected capacity change from 0 to 264192 [ 145.408325][T16239] loop3: detected capacity change from 0 to 264192 [ 145.415716][T16241] FAULT_INJECTION: forcing a failure. [ 145.415716][T16241] name failslab, interval 1, probability 0, space 0, times 0 [ 145.438949][T16234] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 145.442243][T16241] CPU: 1 PID: 16241 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 145.454720][T16234] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 145.458191][T16241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.458205][T16241] Call Trace: [ 145.458212][T16241] dump_stack_lvl+0xb7/0x103 [ 145.468186][T16234] System zones: [ 145.474297][T16241] dump_stack+0x11/0x1a [ 145.474320][T16241] should_fail+0x23c/0x250 [ 145.482292][T16234] 0-2, 18-18 [ 145.490240][T16241] ? security_file_alloc+0x30/0x190 [ 145.495266][T16234] , 34-35 [ 145.506248][T16241] __should_failslab+0x81/0x90 [ 145.506270][T16241] should_failslab+0x5/0x20 [ 145.506290][T16241] kmem_cache_alloc+0x46/0x2e0 [ 145.516854][T16234] [ 145.529399][T16241] security_file_alloc+0x30/0x190 [ 145.548764][T16234] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 145.551348][T16241] __alloc_file+0x83/0x1a0 [ 145.556005][T16234] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 145.560100][T16241] alloc_empty_file+0xcd/0x1c0 [ 145.688284][T16239] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 145.692510][T16241] alloc_file+0x3a/0x280 [ 145.700331][T16230] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 145.702376][T16241] alloc_file_pseudo+0xe2/0x130 [ 145.723980][T16239] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 145.730407][T16241] __shmem_file_setup+0x14c/0x1d0 [ 145.730435][T16241] shmem_file_setup+0x37/0x40 [ 145.738436][T16239] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 145.746354][T16241] __se_sys_memfd_create+0x1eb/0x390 [ 145.746376][T16241] __x64_sys_memfd_create+0x2d/0x40 [ 145.754354][T16239] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 145.762456][T16241] do_syscall_64+0x3d/0x90 [ 145.773082][T16230] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 145.787940][T16241] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.787976][T16241] RIP: 0033:0x4665f9 [ 145.787989][T16241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.788007][T16241] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 145.788028][T16241] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 145.800239][T16230] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 145.810757][T16241] RDX: 0000000000022100 RSI: 0000000000000000 RDI: 00000000004bee86 [ 145.810775][T16241] RBP: 0000000000000004 R08: 0000000000011080 R09: ffffffffffffffff 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004060006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01011a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x227c, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x7c, r3, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x80000001}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0xdfd6529b138f26dc) r4 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x227c, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESDEC=0x0, @ANYRES32=r4], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x28011, r0, 0x0) madvise(&(0x7f0000951000/0x2000)=nil, 0x2000, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0x7f, 0x7, 0x1}) sendfile(r0, r1, &(0x7f0000000180)=0x501, 0x3) write$P9_RREADDIR(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="680000002901000109000001030000000000000000000000000000000076ceef5a71bd9ccf1870853286200000000007002e2f66696c65302002000000000000000000000006fdffffffffffff080701000000000000000009000000000000000707002e2f66696c653000"/118], 0x68) 18:53:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 145.810787][T16241] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 145.817292][T16230] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 145.826426][T16241] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 146.528080][T16273] FAULT_INJECTION: forcing a failure. [ 146.528080][T16273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.541351][T16273] CPU: 1 PID: 16273 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 146.549772][T16273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.559910][T16273] Call Trace: [ 146.563188][T16273] dump_stack_lvl+0xb7/0x103 [ 146.568008][T16273] dump_stack+0x11/0x1a [ 146.572223][T16273] should_fail+0x23c/0x250 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000070006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 146.576723][T16273] __alloc_pages+0x102/0x320 [ 146.581407][T16273] alloc_pages_vma+0x513/0x680 [ 146.586186][T16273] shmem_getpage_gfp+0x95a/0x13e0 [ 146.591210][T16273] shmem_write_begin+0x7e/0x100 [ 146.596155][T16273] generic_perform_write+0x1a6/0x3d0 [ 146.601452][T16273] __generic_file_write_iter+0x174/0x310 [ 146.607106][T16273] ? generic_write_checks+0x250/0x290 [ 146.612479][T16273] generic_file_write_iter+0x75/0x130 [ 146.617869][T16273] vfs_write+0x77d/0x8c0 [ 146.622178][T16273] __x64_sys_pwrite64+0xf5/0x150 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080c0090006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 146.627148][T16273] do_syscall_64+0x3d/0x90 [ 146.631677][T16273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.637662][T16273] RIP: 0033:0x419797 [ 146.641649][T16273] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 146.661632][T16273] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 146.670049][T16273] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 146.678018][T16273] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 146.686069][T16273] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 146.694039][T16273] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 146.702005][T16273] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000a0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 146.745697][T16304] loop3: detected capacity change from 0 to 264192 [ 146.761908][T16305] loop0: detected capacity change from 0 to 264192 [ 146.770813][T16315] loop5: detected capacity change from 0 to 264192 [ 146.778459][T16304] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000b0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 146.808661][T16305] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 146.827216][T16305] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 146.846104][T16305] System zones: 0-2, 18-18, 34-35 [ 146.852306][T16273] loop1: detected capacity change from 0 to 264192 [ 146.861051][T16304] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 146.864406][T16305] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 146.878645][T16304] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 146.889848][T16305] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 146.901979][T16304] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 146.924514][T16315] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000180006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 146.950134][T16315] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 146.968240][T16315] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 146.980441][T16315] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010002, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 147.020431][T16273] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 147.108988][T16350] FAULT_INJECTION: forcing a failure. [ 147.108988][T16350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.122088][T16350] CPU: 1 PID: 16350 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 147.130691][T16350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.140749][T16350] Call Trace: [ 147.144036][T16350] dump_stack_lvl+0xb7/0x103 [ 147.148640][T16350] dump_stack+0x11/0x1a [ 147.152795][T16350] should_fail+0x23c/0x250 18:53:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010204, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010003, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080001c0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:27 executing program 2: sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="001044bd7000fbdbdf25310000000500360001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4000000) r0 = open(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)="39000000130009006900cf47a7912e30d1eb8000200000004600010707000014190001801000000800005068230000000000ef38b7461e59d7", 0x39}], 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x80, r2, 0x303, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "20d6ca731febb8c8b3f94504e8"}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x1c, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6ccbf95f4bcc9fd7d6dc6bec2e"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004804}, 0x24000000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x1e) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={r5, 0x3, 0x6, @broadcast}, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002240)={&(0x7f0000002140)={0xdc, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x48000}, 0x40d1) sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000002580)={0x1738, 0x0, 0x8, 0x0, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x77}, @val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x0, 0x3e}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x79c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0x78c, 0x4, 0x0, 0x1, [{0xf0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}, @NL80211_PKTPAT_MASK={0xdc, 0x1, "092441750f2fb7a1f23177a225c703d873c015404ad6eb3b3ea1ff5d147cdfee1ff70b85420b4494a125e707c53a8e2343f0a4e851de3bca0ead10123d92fb747f63bba97f8c28915670e064e8ce5ed7912cd1985137bbe88bc70dce69374ce9a264be8d2eef669562ca6325c17fdccf01c9edd82d3aa5da7bcfd1fb371857359c8cb4557552309937a2223c6458383536abe542542965cdc9461418e3f6f2d08ee73894dd58aab03a9b86ba772db646df50ba1cd779fe48627853372a182e8e996bfed861d303541f2ed1e44e9983283594382ef726724f"}]}, {0x2b0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x6f, 0x2, "c7a2abb51c9245e4722b1f3a08302b58084880ae2f777bb5ed73093ed1895db6a122847653bbd231a19372f7b29dff2d3d4a9a851a2948c7389fe195abbf457199ee435e23b05fe36a65ffeda90d74f810e7df5343f042e53256b3596169f537d14fe71d43514ae6fe282c"}, @NL80211_PKTPAT_PATTERN={0x50, 0x2, "39099b82c139d4c50f4558863e413ba813c8a9612e62116dbae288a3f4d3b21a3b1223426e968bb9c78d834a905c4693c972124377e53d502448dc748c0fcf9ad2fb8db5b94a1cf7f9db5fbe"}, @NL80211_PKTPAT_MASK={0x90, 0x1, "bd6f8658262cf192ea00908a66c2bfc4c7cb25912a8d482cb646f73223c3b3c6c38659c805d9b97fc7725ad5dcafba4166116083df208218711a20c79349ed350a00307ca8595776a9602a2d11a0baf1282dbaf2589f85fea378cbf6b5587e1a4d25377b90ccf0cc8e5fd13fae05224eb6857fa36b667cb57fb264e61c066984c09fe5837661b47f72c6741b"}, @NL80211_PKTPAT_PATTERN={0x5f, 0x2, "4b68950614b33a49ed1669eff1229c063b6b57883e6acc1417bd89a6b36caa8627c1ee7102c3cefb027606946e328f1ec0ea36ddf6844da88510cb51699e211caa6561029a647516a7e7fb7270740aa683cc99350a83ab8a868e5e"}, @NL80211_PKTPAT_MASK={0xfa, 0x1, "0c349720562815cf37e6469bbb3a029c70dadfef1392cb20de21788865d7d3acf5d3aefe5a8a489c72281014f71dac86b61eefb19729ff0716cb4f95160eacfb5f5b86cb97389ca2a608404fde984395ed6f1b72629c8cd3d16a2ef26446fe1569e9086a5425c2f3ab74cefb59ac75038518d929ba16e968fd456b8c258c70509f477b356986e5454e1b5e02ca97cb06ea7d9d96678a979e6d82a21216dd62f6fcd0cd737397910562e23686541954f0d606b0b00023e1f2b894a3f98da45d40103167ce97f00a5552659c6e5dced8e8382fa8548a66c2cfb49041a79174feb54ba4fe6a7acfde04cba394c37be19901e7b6864a76d8"}]}, {0x118, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x9}, @NL80211_PKTPAT_PATTERN={0x71, 0x2, "cc8eba41288b7384646fa1fa0cc197cdc8e73ab091c275e8c6e72cf67ce5c9f928e5733b4b74de6fa458cfb58c33dfdc4ae143822a90917d8e0f59ded9d28d8ae9cef74e7e94d5caccf416a21f9c5df349d5f1290fe6a9ad1ae934cb575f98480a8b83c540e2ba3fbebc3164ad"}, @NL80211_PKTPAT_MASK={0x27, 0x1, "7d4eba2a43f7e700340cffb03b0374dc1d17bc03817a498e62f5e968de1c87c560cc63"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}, @NL80211_PKTPAT_PATTERN={0x5a, 0x2, "0d5c9ced18925ca7931960b0a2e53efc5c519f1e9fef86a85e9ad70e9753f07de109f67fe275743ccbd4d4465558c5215513483863d62c0197eecb3a85c0c6188e6672f00a04652f492802fede7d58a097039b6db667"}, @NL80211_PKTPAT_MASK={0x4}]}, {0xf4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1dcec85d}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x7a, 0x2, "227b19dce69c79e9c17988e3fcee0f4ec937872a8d17ba546ab56bf57025fc303e992ff15eff831c0c5d456b710c984847dee65d27038c999c51b7c70308489fcb5e67b27eac3260ff9568447661b0f699eee8d2ab063472f93c8f5004c0ccfa01f61f84f82fd2ae850bfd75059bf5e03d1c13e70146"}, @NL80211_PKTPAT_PATTERN={0x45, 0x2, "8999ce160b655cae5ab43ebfdd432768d81d6026510e70db66a1efc7ebc7e744095ad3b365812098903bdf8b07813bd9d65c3f251d0df97fc0d5ce0862753ded41"}, @NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_PATTERN={0x18, 0x2, "34fef65a49d2c23d79baa16abc368224454e87d4"}]}, {0x1dc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x4}, @NL80211_PKTPAT_MASK={0xe1, 0x1, "213c9554517e5bae3a4b734ee24f53767ad7be6d15451ad7f39fc22611fc1e945abd4512da2e4fd8b6514b54f4cf196a207e034ae0f3f2bd3e2973736b5bb9dd5b9afe043dc32f7d884c017b748a4e26d87eed9e16d4f3198eeb1ded7f63300b5e303fecd7d39cb0df1e0d725ef4948c50b1a9ae23c11eeaa800e396d86707ffd4d052af3f0aa8a7a74ba3416d7b5ad6c40c16bbee1bedb5858be92fb478e35e8f435d985f0df06bb27dfce6d11dd46bf241659785c277e517ea928b9f27d4d521e0ceafeaadfbfffad0b1ee22a305a8c1f682fb36bc7667d25e9206f3"}, @NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_PATTERN={0x8, 0x2, "e5141c65"}, @NL80211_PKTPAT_PATTERN={0x93, 0x2, "38ce83c3407489d5777f6e8e74903bbe0dd7c24656da03e629635d7d3a473dc6804e6ac4d4a7215fe87335e128e207547745fcfa2a3ead392a422130bd8d5dbdb8e3da2a68f4ec9973c43a94aea084a207b18206a2d13f075acd50a90d9bf9aaed8c520f2035ec097de86bc79ea0008b230698634ab11506368cc4762c1fda7253dfd832c7a8af4d3703be3e8faa76"}, @NL80211_PKTPAT_PATTERN={0x4a, 0x2, "501ae10cf7d3a8656378af52cb634bf15a7bd8313d65972867af8f39197bd77b1c739baf95872786efc506e17eaa9943f5e8b41a200407d1ab6c6ae8eaa691c795d1f2fa7a81"}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xea4, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xe94, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x0, 0xffe}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x7fffffff, 0x6, 0x80000001}}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @broadcast}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD={0x14, 0x6, "6cc07ae7c46ec0290fb96c53f827f376"}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x1}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD={0xdbc, 0x6, "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"}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x81, 0x8, {0x9, 0x1, "cab726bedd4ef5c3e8a48478e5227c57b6d1a0e15363f3f77a7909efa7ebd8f0d51443fa6475656813ab6cb5d86fbce189b2281c7f31bba4e118efa5d8ff817777b5c60d53272e7b9b0f050bf9b2289f0267394d8a92c1c4b8ad8d1528bb58c6fb5e2951700de70349cb6e80974091bc6ef4368765"}}, @NL80211_WOWLAN_TCP_DST_PORT={0x6, 0x5, 0x4}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x8c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0x60, 0x4, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_PATTERN={0x4}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x22, 0x2, "c284533de379aeee6d18a5f85dbbbf6093700d3d8fd72931b35eda95d7f0"}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8}]}]}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x24, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0x4}, @NL80211_WOWLAN_TCP_DST_MAC={0xa}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x4}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @device_b}]}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x24, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x1c, 0x12, 0x0, 0x1, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac=@device_b}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x0, 0xff}}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}]}]}, 0x1738}}, 0x24000c01) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001f40)={&(0x7f0000000340)={0x1668, r2, 0x20, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x1000, 0x3b}}}}, [@NL80211_ATTR_CSA_IES={0x1640, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x18, 0xbb, [0x2, 0x2, 0x0, 0x5, 0x6, 0x3, 0x5, 0x400, 0x8, 0xaae7]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0xa, 0xba, [0x9, 0x7, 0x7]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x4f3, 0x91, "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"}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x1000]}, @beacon_params=[@NL80211_ATTR_IE_ASSOC_RESP={0x10a, 0x80, [@perr={0x84, 0xfb, {0x40, 0xf, [@not_ext={{}, @device_a, 0x70bc4169, "", 0x3c}, @ext={{}, @broadcast, 0x9, @device_a, 0x1c}, @ext={{}, @device_b, 0xb70f, @broadcast, 0xb}, @not_ext={{}, @device_a, 0x8001, "", 0x1c}, @not_ext={{}, @broadcast, 0x5, "", 0x2}, @ext={{}, @broadcast, 0xfffffeff, @broadcast, 0x20}, @ext={{}, @broadcast, 0xdb, @device_b, 0x38}, @ext={{}, @broadcast, 0xffff, @device_a, 0x2a}, @ext={{}, @device_b, 0x2, @device_a, 0x32}, @not_ext={{}, @device_a, 0xfffffffa, "", 0x13}, @ext={{}, @device_b, 0x5, @device_b, 0x22}, @ext={{}, @broadcast, 0x0, @device_b, 0xe}, @not_ext={{}, @device_b, 0x6, "", 0x2c}, @ext={{}, @broadcast, 0x4, @device_a, 0x2d}, @not_ext={{}, @broadcast, 0x1a, "", 0x3b}]}}, @peer_mgmt={0x75, 0x4, {0x1, 0x2, @void, @void, @void}}, @challenge={0x10, 0x1, 0x1a}]}, @NL80211_ATTR_IE_ASSOC_RESP={0xc, 0x80, [@cf={0x4, 0x6, {0x7, 0xff, 0x7, 0x401}}]}, @NL80211_ATTR_PROBE_RESP={0x799, 0x91, "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"}, @NL80211_ATTR_BEACON_HEAD={0x9e, 0xe, {@with_ht={{{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x81}, @device_a, @device_a, @random="67dabd3a18c2", {0x8, 0x9}}, @ver_80211n={0x0, 0x3ebb, 0x2, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}}, 0x7, @random=0x1000, 0x48c0, @val={0x0, 0x6, @default_ap_ssid}, @void, @val={0x3, 0x1, 0x6}, @val={0x4, 0x6, {0x1, 0x6, 0x80, 0x26e7}}, @val={0x6, 0x2, 0xff7f}, @val={0x5, 0x2d, {0x1, 0xaf, 0x5, "43966e2b1eddaa6033195b999d5148dcaad8642209817b211815896fdc7455f662580a8e1456d421a878"}}, @void, @void, @void, @val={0x2d, 0x1a, {0x40, 0x0, 0x0, 0x0, {0x1ff, 0x33, 0x0, 0x7f}, 0x1, 0x9, 0x40}}, @val={0x72, 0x6}, @void, @val={0x76, 0x6, {0x6, 0x7f, 0x28, 0xaf4}}}}, @NL80211_ATTR_BEACON_HEAD={0x606, 0xe, {@with_ht={{{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, {0x40}, @device_a, @device_b, @random="c059ca817dd5", {0xc, 0xe8b}}, @ver_80211n={0x0, 0x6a7, 0x1, 0x1, 0x0, 0x0, 0x1}}, 0x100000001, @random=0x4, 0x80, @void, @void, @val={0x3, 0x1, 0x9}, @val={0x4, 0x6, {0x3, 0x0, 0x8, 0x3c}}, @val={0x6, 0x2, 0x7}, @val={0x5, 0xe4, {0x40, 0xf1, 0x0, "b1a468b5bf237e3709e08e1e3b059ffd449b2e6a11567c82bc7b27476628fdd24751021750d1a88a1a3798b382df5eb3f1ca7b9ebabb8f69a4bf13e53aa3b429413ca26207ad8afeea0c2b3e7da9cda03bc7b3e1afc0c7ace2a2c493e53d798a2b7e9768d274d4b896d0382b7e2d4122f42e8659aa3b408780975bd1e5dd8d72741601419c334507bae909b45f8e16eeb020b34661964600cdd24b6e52c0f0858e93829d935ed44f9a4bba1351504adac840e0836775a2fc4448a9ac6173d5589083a38bd9507b2a94229a9647978bce6784a7a61441a75df84ec590539d51c848"}}, @val={0x25, 0x3, {0x0, 0x34, 0x7f}}, @void, @val={0x3c, 0x4, {0x1, 0x8f, 0x63, 0xff}}, @val={0x2d, 0x1a, {0x40, 0x1, 0x1, 0x0, {0x0, 0x1e8a, 0x0, 0x4, 0x0, 0x1, 0x1}, 0x1, 0xe7, 0xaf}}, @val={0x72, 0x6}, @void, @val={0x76, 0x6, {0x6, 0x7f, 0x29, 0x8}}, [{0xdd, 0xc8, "eb2219e527d089f86148445b6aced84914ef46417b9c3199168ae109862fc632f7ba810896c27fce7d05c6409e6d045d1404f3a8363460dffc1139a0d2720b1146042fd1e17ee9a1571918945ffd33e767932feafed098a09aa946ac11f7fb73fcd6d5cdfd90c4612c22212d57c3becd6fb052604204b710b798b44fa5751a2034490811cff2a3a8505bb9ad4a8d3ef2d39d749386d29f28b23cbb1822e3fc518bd1a77ef531d7adca0102b7ea41aa6bde3e1da8221460dd4a1203f758a630e8bee06e58da743ee8"}, {0xdd, 0xea, "7660bee9ac391302bbefa4649e7a182e974d617799674075d6b07cb9f2659407395da5a5a2961101f1b41126fc2cf5cde153a8562f2b499f96bda7b67e75a74b10389544e5ef9f14e461c68b4488caec046e4f087cfd3d3182e3dda4de231574ed34c4ac700098f648bc78713f9629e76804315342d69f30713f9e06d4b4b5a709d8fdf0395269f95d583b2925e1df9aaff030e21175d90846eb3f6ccbe5a2632fb5c556898aea87f68044f15aa82df0f478c6167ebef43fe5e2df9715e40632ff09b9c76a6a0f1148f1535a194b4ca00156f6efb1c72b2df73711acf0a4dcd0ddb3b92a94dd59392c26"}, {0xdd, 0x97, "5428f9517c7b9547bca68684c4059fa2c7b839c922dcfe38a7b42f22873163de314e856eb39f27013c99e529a5f514bdb4f7f5cbe62505ce0daaccc911f09a684b1c14c490eb430f77643ffd77411512d445b07c50651959c5be6bcd55e4f3af84c49e712a6ad9d7ca616667a650e1ff0ff820d75932cab0402e86f97cb2c501dc7ce4fb57d1bcc02d561e9d5c6228e450fd5548590b5f"}, {0xdd, 0x95, "5abfd7ed6b23058c5589cade8edc5b6b4e202de1338a6d263a047dc879f601bb1b83e31dd98255c6abe95e7cf84d440bf31db800136f606e6d8f627c232b83b19c751a43bf93261da7057215ca0e6f9ae1f3c6dbf4b13363e0ffff8add5645f7162bc8cfb24799ea89e2d5ae2c266ab22737bdeafc723b765651143a4905f80f07c8897b15573b7b07df3e3dfd3381b0c5fe152bda"}, {0xdd, 0x4c, "fbcffbf191fa9fb02c6bfc451ec6f9700f17afe276909fb429c2fbe99d65694ed3ff063b56224d950d6212d81e6025d83d0822814dd83a3316464194cd9a10123bff2f141612ebcc1c550c0a"}, {0xdd, 0x54, "3d906e38d0cc32f1b505367636a42b96e4b641a0fc7353d22f48d3ae835e54d91edea9f1af3b8a1339b218678e6ce0cb519d8e1f0fc37e7c704fafe6b826bb545a2aa95486457634323efe6187fbfd98cab3e0ae"}, {0xdd, 0xc5, "e53b53af952940a99848d772c0b5bff9cbb323dc1420177448ce277f02634e1c7768f7392eef00d691cd12d02fe19c52304d3e026b349b97e9fd1a3ea72b38b711f1a8a87bae45a4a02c6ace172bb908f937f5e9a82091fa5d6e7a109806a8684292f8b7516f442500d9eb52c6eaa35926cda8647da935c2a3ca4dc2d0da7654ead9e14f5d4102f28d639f507b9c8213c8d319d267b17ae5185fa15fe521b9f58d69569d77a572fee99580ee9e571652abd0f6c24b20c7a3530d0976933d9ed9ddbe7f1626"}, {0xdd, 0x1f, "47aba9462ce40bebb8112dbf14c4963399899a2f0e0b0900487e0708fd5a3d"}, {0xdd, 0x3a, "c2c7f8f8e68edfe2d7f500c7b836b4753183dc1f3785a5ba2bbbb02689d87a7cc50bb26acb194f04d8b012bd0d91a6ee91307d208059152573fb"}]}}, @NL80211_ATTR_FTM_RESPONDER={0x1a8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0xf6, 0x2, "5e903faa88c688251b627a6efdcbd29099a9d89d0e4bd0211f44b7f05e95e679bba0797dc2050e61a98e1da6130ebbcd4b3a573cb995ac0f2d68b4b8180473ec25621517022385be9346217789e1d9eadca340e8513cf870342ff0cfac2cac2270fd01e10712109e395ab43e68e3b5b48ac4a17b22cf9ba34e7d08b6601f3ee09de2543aa552686bc85259ace8e5647be03052b503d83cf20869e7c1136225b9590acd3e8e06807b00c475083d1baaaf8183065880c5743f973324bb0bd692bdb05be344345fc5489ccaf54e02e069f2dc0e0bd15afc37e300ef23d07444e36954a951283baaf1a1f155521fbc30be660826"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x9b, 0x2, "83e0b8ab9392c73dda8a36600f6e9d2c7701220fbc1ad7766fde421dcfc827752717df1f0dd04d4932a91b424fbb12769584a8995fb816b5a48ae938b6eeea807c820a3422efdd72c03044dcfd863f84754f747f8c7ffa5db4ae941db2459cb108cc78f671358f3f64a4cfc7daccc66b544ea9b413d2b0ba8c4d7ffe546ad3b2ccdf44cc9ab217b944c3e0786624db30d6e6454b97cd9e"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}], @NL80211_ATTR_CSA_C_OFF_BEACON={0xc, 0xba, [0x3, 0x0, 0x8, 0x1ff]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0xc, 0xbb, [0x8000, 0x9, 0x1, 0x967]}]}]}, 0x1668}}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x500, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x10) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 147.157488][T16350] should_fail_usercopy+0x16/0x20 [ 147.162578][T16350] copy_page_from_iter_atomic+0x2c1/0xba0 [ 147.168397][T16350] ? shmem_write_begin+0x7e/0x100 [ 147.173428][T16350] generic_perform_write+0x1ef/0x3d0 [ 147.178732][T16350] __generic_file_write_iter+0x174/0x310 [ 147.184685][T16350] ? generic_write_checks+0x250/0x290 [ 147.190160][T16350] generic_file_write_iter+0x75/0x130 [ 147.195748][T16350] vfs_write+0x77d/0x8c0 [ 147.200183][T16350] __x64_sys_pwrite64+0xf5/0x150 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000200006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 147.205440][T16350] do_syscall_64+0x3d/0x90 [ 147.209961][T16350] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.215978][T16350] RIP: 0033:0x419797 [ 147.219870][T16350] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 147.239660][T16350] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 147.248147][T16350] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 147.256106][T16350] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 147.264129][T16350] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 147.272093][T16350] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 147.280047][T16350] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 18:53:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x62, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000070000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000002c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x108) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x11, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 18:53:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000260006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 147.325574][T16370] loop5: detected capacity change from 0 to 264192 [ 147.338600][T16370] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 147.357596][T16371] loop3: detected capacity change from 0 to 264192 [ 147.373301][T16370] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 147.391062][T16370] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 147.403858][T16370] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 147.406136][T16386] loop0: detected capacity change from 0 to 264192 [ 147.429309][T16386] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 147.463531][T16386] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080052f0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 147.472199][T16371] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 147.494018][T16386] System zones: 0-2, 18-18, 34-35 [ 147.499540][T16386] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 147.510602][T16386] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 147.535363][T16371] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 147.553118][T16371] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 147.565349][T16371] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080003f0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 147.582135][T16350] loop1: detected capacity change from 0 to 264192 [ 147.593018][T16350] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 147.626555][T16350] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 147.647791][T16350] System zones: 0-2, 18-18, 34-35 [ 147.663363][T16419] loop0: detected capacity change from 0 to 264192 [ 147.672864][T16419] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 147.676193][T16350] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 147.693094][T16350] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:28 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010004, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:28 executing program 2: socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{0x0, 0x5, 0x9aee, 0xffffffffffff7fff, 0x7f, 0x3, 0x3, 0xccf, 0x2, 0x80000000, 0x7fff, 0x539b, 0x1, 0x7f, 0x8d}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000400)={{r1, 0x0, 0x3, 0x2000000, 0x1f, 0x3, 0xdb4b000000000000, 0x3, 0x4cc, 0x6a5da8f2, 0x5ac5, 0xca6, 0x0, 0x5, 0x1000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x0, 0x0, @buffer={0x0, 0x0, &(0x7f0000001540)=""/188}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0}) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r9}, {0x0, r9}, {r8}, {r8}, {r8, r9}, {}, {}, {0x0, r9}, {}, {r8, r9}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {}, {r8}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {r8}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {r7}, {}, {r7}, {}, {}, {}, {r7, r9}, {}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r7}, {}, {0x0, r9}, {r8}, {}, {0x0, r9}, {r8, r4}, {0x0, r9}, {r8}, {0x0, r9}, {}, {r7, r9}, {}, {r7}, {}, {}, {r7}, {}, {r8, r9}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r3, r9}, {}, {0x0, r9}, {}, {r8}, {r7, r9}, {}, {r7}, {}, {}, {0x0, r9}, {}, {r8}, {r7}, {}, {}, {}, {0x0, r9}, {r8}, {}, {}, {0x0, r9}, {r7}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r7, r9}, {}, {}, {0x0, r9}, {}, {r7}, {0x0, r9}, {}, {r8}, {r7, r9}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {r7}, {0x0, r9}, {0x0, r9}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {r8}, {}, {r7, r9}, {r7}, {r8, r9}, {}, {r7}, {r7, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {}, {r8, r9}, {}, {}, {r7, r9}, {}, {r8, r9}, {r7, r9}, {r8, r9}, {0x0, r9}, {}, {r8, r9}, {r8}, {}, {r7, r9}, {r7}, {0x0, r9}, {r8}, {r7}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r8}, {0x0, r9}, {r8}, {r7}, {}, {}, {}, {0x0, r9}, {r7, r9}, {r8, r9}, {}, {0x0, r9}, {}, {r8}, {0x0, r9}, {}, {}, {r7}, {r7}, {0x0, r9}, {r7, r9}, {r8, r9}, {0x0, r9}, {r7}, {}, {r7}, {0x0, r9}, {r8}, {0x0, r9}, {r7, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {r8}, {r7}, {}, {r7}, {r7}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r8, r9}, {}, {}, {}, {r7, r9}, {r8}, {0x0, r9}, {}, {}, {r7}, {}, {r7}, {r8}, {}, {r7}, {}, {}, {}, {r8}, {0x0, r9}, {r7}, {}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {r7, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {}, {r8, r9}, {}, {0x0, r9}, {r7}, {r8, r9}, {r8, r9}, {r8}, {r8, r9}, {r7, r9}, {}, {}, {r8}, {r7, r9}, {0x0, r9}, {r7, r9}, {}, {r8}, {r8}, {r7}, {}, {r8}, {r8}, {}, {}, {}, {r8, r9}, {0x0, r9}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004f0c0)) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) clone3(&(0x7f0000007080)={0x60021100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:53:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000400006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 147.720774][T16419] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 147.762698][ C1] sd 0:0:1:0: tag#4166 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 147.770845][T16419] System zones: 0-2 [ 147.772750][ C1] sd 0:0:1:0: tag#4166 CDB: opcode=0xe5 (vendor) [ 147.772767][ C1] sd 0:0:1:0: tag#4166 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 147.772785][ C1] sd 0:0:1:0: tag#4166 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 147.776608][T16419] , 18-18 [ 147.782929][ C1] sd 0:0:1:0: tag#4166 CDB[20]: ba [ 147.792021][T16419] , 34-35 [ 147.811207][T16439] loop5: detected capacity change from 0 to 264192 [ 147.813449][T16419] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 147.829706][T16419] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 147.844454][T16440] loop3: detected capacity change from 0 to 264192 18:53:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004800006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01031a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 147.857103][ C0] sd 0:0:1:0: tag#4167 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 147.866961][ C0] sd 0:0:1:0: tag#4167 CDB: opcode=0xe5 (vendor) [ 147.873289][ C0] sd 0:0:1:0: tag#4167 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 147.882359][ C0] sd 0:0:1:0: tag#4167 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 147.891491][ C0] sd 0:0:1:0: tag#4167 CDB[20]: ba 18:53:28 executing program 2: socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{0x0, 0x5, 0x9aee, 0xffffffffffff7fff, 0x7f, 0x3, 0x3, 0xccf, 0x2, 0x80000000, 0x7fff, 0x539b, 0x1, 0x7f, 0x8d}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000400)={{r1, 0x0, 0x3, 0x2000000, 0x1f, 0x3, 0xdb4b000000000000, 0x3, 0x4cc, 0x6a5da8f2, 0x5ac5, 0xca6, 0x0, 0x5, 0x1000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x0, 0x0, @buffer={0x0, 0x0, &(0x7f0000001540)=""/188}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0}) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r9}, {0x0, r9}, {r8}, {r8}, {r8, r9}, {}, {}, {0x0, r9}, {}, {r8, r9}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {}, {r8}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {r8}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {r7}, {}, {r7}, {}, {}, {}, {r7, r9}, {}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r7}, {}, {0x0, r9}, {r8}, {}, {0x0, r9}, {r8, r4}, {0x0, r9}, {r8}, {0x0, r9}, {}, {r7, r9}, {}, {r7}, {}, {}, {r7}, {}, {r8, r9}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r3, r9}, {}, {0x0, r9}, {}, {r8}, {r7, r9}, {}, {r7}, {}, {}, {0x0, r9}, {}, {r8}, {r7}, {}, {}, {}, {0x0, r9}, {r8}, {}, {}, {0x0, r9}, {r7}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r7, r9}, {}, {}, {0x0, r9}, {}, {r7}, {0x0, r9}, {}, {r8}, {r7, r9}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {r7}, {0x0, r9}, {0x0, r9}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {r8}, {}, {r7, r9}, {r7}, {r8, r9}, {}, {r7}, {r7, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {}, {r8, r9}, {}, {}, {r7, r9}, {}, {r8, r9}, {r7, r9}, {r8, r9}, {0x0, r9}, {}, {r8, r9}, {r8}, {}, {r7, r9}, {r7}, {0x0, r9}, {r8}, {r7}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r8}, {0x0, r9}, {r8}, {r7}, {}, {}, {}, {0x0, r9}, {r7, r9}, {r8, r9}, {}, {0x0, r9}, {}, {r8}, {0x0, r9}, {}, {}, {r7}, {r7}, {0x0, r9}, {r7, r9}, {r8, r9}, {0x0, r9}, {r7}, {}, {r7}, {0x0, r9}, {r8}, {0x0, r9}, {r7, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {r8}, {r7}, {}, {r7}, {r7}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r8, r9}, {}, {}, {}, {r7, r9}, {r8}, {0x0, r9}, {}, {}, {r7}, {}, {r7}, {r8}, {}, {r7}, {}, {}, {}, {r8}, {0x0, r9}, {r7}, {}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {r7, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {}, {r8, r9}, {}, {0x0, r9}, {r7}, {r8, r9}, {r8, r9}, {r8}, {r8, r9}, {r7, r9}, {}, {}, {r8}, {r7, r9}, {0x0, r9}, {r7, r9}, {}, {r8}, {r8}, {r7}, {}, {r8}, {r8}, {}, {}, {}, {r8, r9}, {0x0, r9}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004f0c0)) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) clone3(&(0x7f0000007080)={0x60021100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 147.922444][T16440] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 147.936480][T16439] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 147.978497][T16440] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 147.988280][T16439] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 147.996061][T16440] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008009c00006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 148.013655][T16439] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 148.025908][T16440] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 148.038235][T16439] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 148.089305][T16475] FAULT_INJECTION: forcing a failure. [ 148.089305][T16475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.102467][T16475] CPU: 0 PID: 16475 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 148.108411][ C1] sd 0:0:1:0: tag#4168 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 148.110909][T16475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.110923][T16475] Call Trace: [ 148.110930][T16475] dump_stack_lvl+0xb7/0x103 [ 148.120747][ C1] sd 0:0:1:0: tag#4168 CDB: opcode=0xe5 (vendor) [ 148.130757][T16475] dump_stack+0x11/0x1a [ 148.130784][T16475] should_fail+0x23c/0x250 [ 148.134056][ C1] sd 0:0:1:0: tag#4168 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 148.138599][T16475] should_fail_usercopy+0x16/0x20 [ 148.145001][ C1] sd 0:0:1:0: tag#4168 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 148.149112][T16475] copy_page_from_iter_atomic+0x2c1/0xba0 [ 148.153508][ C1] sd 0:0:1:0: tag#4168 CDB[20]: ba [ 148.162487][T16475] ? shmem_write_begin+0x7e/0x100 [ 148.192464][T16475] generic_perform_write+0x1ef/0x3d0 [ 148.197771][T16475] __generic_file_write_iter+0x174/0x310 [ 148.203435][T16475] ? generic_write_checks+0x250/0x290 [ 148.208819][T16475] generic_file_write_iter+0x75/0x130 [ 148.214414][T16475] vfs_write+0x77d/0x8c0 [ 148.218677][T16475] __x64_sys_pwrite64+0xf5/0x150 [ 148.223619][T16475] do_syscall_64+0x3d/0x90 [ 148.228085][T16475] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.234251][T16475] RIP: 0033:0x419797 [ 148.238136][T16475] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 148.257915][T16475] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 148.266439][T16475] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 148.266954][T16498] loop0: detected capacity change from 0 to 264192 [ 148.274409][T16475] RDX: 0000000000000021 RSI: 0000000020000040 RDI: 0000000000000004 18:53:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 148.274425][T16475] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 148.274438][T16475] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 148.274449][T16475] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 18:53:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010005, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080fffe0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 148.350542][T16475] loop1: detected capacity change from 0 to 264192 [ 148.389589][T16498] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 148.398984][T16475] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 148.435276][T16513] loop3: detected capacity change from 0 to 264192 [ 148.442034][T16475] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 148.442098][T16498] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 148.454436][T16475] System zones: 0-2, 18-18, 34-35 [ 148.462325][T16521] loop5: detected capacity change from 0 to 264192 [ 148.484923][T16475] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 148.496008][T16475] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 148.496466][T16498] System zones: 0-2, 18-18, 34-35 [ 148.512241][T16498] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 148.523325][T16498] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:29 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x80080, 0x0) fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x2, r0}) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8, 0x0, 0x80}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x227c, &(0x7f0000000080)) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r5, 0x227c, &(0x7f0000000080)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r2, &(0x7f0000005d40)=[{{&(0x7f0000000140)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000002c0)="ca0b2e7e037ecd023643c27ba50f95fc3b16fd9341b7119e8e7d447f7449f58790090d476d14ce968eec5d426a53d5d38b1d55a093b53eed2b5cb5ca5c55ce88abed08683a8c3de78320eebdca98423aebc1c1760bf85ed68986bf23e5488d174e8adca995658ad1b63e253d7ecc7024dacb87d3bb0b6a3379f1688af4e6e26c060b757ca18e83186a34a0d8c22d69c53e4bfd2ac8e7f6c4d2f4357c250af2bd839e2c65646145ce1b4e8994a561df8533a57646070ee3e2c53ad69e0cc6a5ced5fd7be0640a949bce2e8b8578fba8828f04084db942577e8907cf4fc3af19c9", 0xe0}, {&(0x7f00000003c0)="cb54f01da59551f1bcdec99d4b603246daad3f914700296b3710e36b31587f5dee069292e40cc3b2c79208d6848b3327e20c9b1f2269009de686bb3a4ca081d8bc539a3d5470b3085f6cebcfa91f2e5e3e48f974b5fc7bd32a37b8914814b8de0b3cea51931beee398dc33be9d0646b4c13fc130b13e0377644b09f3b98ba16f", 0x80}, {&(0x7f0000000440)="2822d70ff2622070510f1838c13174e71af0e5df1dfdfa96d1d375dd56ed88edb95ea3a796a98bfc04617e9ae5c7c6ae27a256a76bd7d485656ea7aa358a83b9657e0ca84446ef1ffd820bebd97cea84e4e5f103cb58a8971f74d404211ddfd0ef4b7b8e1b6517c5cd7ca2f24ae245accdaee0a7d06b8cac0d94fe05f012c130b07c7008a99d73c7c5468d05e08a86f634a0fdec262fd3aea8f22afd2e81f33b7a07b9107c1b6ec3a08394352ff066b78cc1a80afdab531655", 0xb9}, {&(0x7f0000000500)="0068b8912d2321ae31a1c8c97226280bda8d6e8fba64231c48a73f540850fe657c503c76666412d098351666ef6e7bf443ac4e25b794b28a85c58eb01389a934c4b7400cc467f4007f1d74e0062ecf8934b0ee6258b69f1b8f67ac16f8e11926802e46427da9dd43228851cf695df0cb7ee9a2c7dbe4bb5971f3fe5984af4e8703", 0x81}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="32aac0604618df3fe89dcab283667af8a7231981c0f988ba37ede4b3c39b749b81184f48699d6bd8c512cc92dd337e09aeef8cbd9da434d25ce0f86821a2276494b22356863526d1d1daaaa38f4df618b36267e3d04b5fa4433aea1ed9722a06c73089a302184858ff4a624b442bf9e397645ccf24db4a623e3fe06d5285044e436b04c7a575b117576e09e15402c3862bbacc70692740db28e71631fe9c2d15dff101c0373fa3d6990f4015e86593d5da403e58588550c5", 0xb8}], 0x6, &(0x7f0000004480)=[@rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, r3, r2]}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r1, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r0}}}], 0x98, 0x40}}, {{&(0x7f0000004540)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000004800)=[{&(0x7f00000045c0)="4afec8e2c9d15741ff40c45ccaa718aa0741f3d978f785c9b6296d8a442bc8fda7e1f9cd725fa388ba995eb5b3799c4e5a62994e9813e0f9b3e1f8852eb38ca2b757837dc43bf462d5440535eb25c42e8c819bfc1063843eeb446221172204273387bfce9ac497d653e9b41b5beb05528aac6060a496cd31372dec5ddc94446e6bde574f28e9c497535dd4cf36092a4ee4b5e29df294851b0ce1b20d036af960ff413bc2f3d4c015", 0xa8}, {&(0x7f0000004680)="b119327d8b43c5078c984d1682ced8cdd0778d4f445ee53597ac73f00b583a448a7b259a8736b1ec2aac59f01d2683e5915960e2b7ee68611eb486a5146257e1bf21b281a897c3d644d2f8007e03870d246818e90aeb75da9cc30c3cdd4beeb5686484d181480581c4ac3dd844ddebb781a8d721687dca294c80077996e75154b86614656434a905b0bc2e19b0a25dd9c490215b204d521814b7f074169e809553d6df55f297fa4e3ac26793c1a43832697a0cab9b917f669bcd34fea1549a1a51bfd05b89b59b19c1965c5927113a70ce9333", 0xd3}, {&(0x7f0000004780)="3d1307ba1ba782aa70fa178d13ff7db2aa50d3c4696eb2710d73f2bbbbc2e791dc9d3ea55f4fed5dc402f1cde7d4a5d78d2b03c16eaedc61376c7756618a9dfb205bb7", 0x43}], 0x3, &(0x7f00000049c0)=[@cred={{0x1c, 0x1, 0x2, {r0}}}, @rights={{0x2c, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}], 0xc8, 0x4000800}}, {{&(0x7f0000004ac0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004e40)=[{&(0x7f0000004b40)="9028c66ae7c474aa8012431981a4b07020251fb875bed5ac7626c21f6b64c6fde7099438ab23fe7d12d767f6c55da3e4fba32b1df7dd3a2218ea93e348fa21a90c42622657d608f30c0243975408fe60544e38fa4fed5d19b96dcbe3d6ecea8f0728159349f7ae1ee1f7a2f746232286af98810f8a2ade6394cd6ad33c66f3961077b9df2629cd177a3c4a654df1c7d4e21358253ee80e2c5e458ff9617109f610fb6c85b80a254ac2b3b1ba85860688045440049d99b862cea655386fcfd342591fbcfd51645c445989ee", 0xcb}, {&(0x7f0000004c40)="b275954ce13baa79ef67c7bfd180f50ec06338f86fb30e8618760cc5cdea7606ed59748878ffb3319ae64fb425b1115dbc42be35612364c2b35556461de9369586670216716dd1b8cff27b5907c1de01965a65930861691236f2972a62f215c17a74a54173e080dc7f823fce046ef33c2d3f8f0da24e8b5b05819f8cd6d75eb8fcbbba0fd4bbcdc0c1c0d8701b1102d69c091cf8d9243ab9491bb9a3e8f5a83a95cf5ba5e0f16c06fccfa1d36cda346a582792dff75794a90914635d38cf51604941a186eb6944a5177f21", 0xcb}, {&(0x7f0000004d40)="33532605449774790edaf18f5924a8c68cd16b9dd42c45df3b000092a1ea52040c3d5c083f127c023fa89d6d7c1682316744598a433721c3528545d1302b17a45b731236cf9c505b9e3497ae3cd278dd886023552950eeb6f65f33fa3fbed355bac731b400520465bae306388a046c08a6ade5ac2a5ff8815e5eeda267351cb32d1955eac8a187103a298d47effabbc74f81f25e2de388a55b1bd0daa9248ee6e0d2e3a1d51347ac372df9e5f5cefc1f068b1811414e06356a7038a02000e2f14c71848de4807a", 0xc7}], 0x3, &(0x7f0000005600)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [r2, r3, r2, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0xb0, 0x24000005}}, {{&(0x7f00000056c0)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000005980)=[{&(0x7f0000005740)="c6dcc4447531c5ddceb0b855cdee9108cd8c508f4149e2c25ed774a3658eaa25e68c242b0e945ae8a132aaf8d9f0dcc892457d54a7705c26609d51f1c43e210d75e9d4fe97be97bc57ac0bedc0d3096903e2aeaca3a6ede65e9858d69f6adb8c315b3fe91266d79719543f45e896864d293be2b141681f70e32f67eddaf59ab4601b9b6e43e9e0f564b0a46fdc9f0c0360600a6678a79af647a8a25dcb1c6fac90dce7d559ab22ebf4f5770e2da0d7179f1c7bae8d5206c431a139d0ddecf3dbc519c027d0d61e", 0xc7}, {&(0x7f0000005840)="7046dcab4a2a0e60cb474e54b44bfb45ce87c149a68bbe3a409c681bdfc480abfc4ad9a26cab88cf4c8c51252d303870da2da1e9aa74ebd789b026e32cf2550d5b529c57bc09db10e741581b109fc94ce767ed795421be07b40cd1450d79d6d5f584c17a4fd3caca613930caa3df9059f11aa1a83c81473a4910bc77722ebb459dc669199194facd113e9fd15fb2f892c3fd044054c06f91bb30dead01cc9129468b0579d8497ba0d63c4d2d21c49008c5f9f1", 0xb3}, {&(0x7f0000005900)="ad00c07d0386f55880871c5f6b7423f92bb52966e40a7d592a913fc5adf2c9997ca92cb4384bab5d9a197a29b84b6522a81ca6f1d4166fc48d6319bc2d6e55961d313b9181ff19a19b5acf447b1540c52a0c327e6c3b60b98664a79eebc94dc32fbd838a584fdcb50f2c", 0x6a}], 0x3, &(0x7f0000005c40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @rights={{0x20, 0x1, 0x1, [r3, r3, 0xffffffffffffffff, r3]}}, @rights={{0x34, 0x1, 0x1, [r3, 0xffffffffffffffff, r3, r2, r1, r2, r4, r5, r6]}}], 0xf0, 0x4044098}}], 0x4, 0x20000804) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x80019e) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x4e141, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x401ffc000) 18:53:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080feff0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 148.554711][T16513] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 148.564210][T16521] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 148.585791][T16521] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 148.603303][T16521] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 148.615543][T16521] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000005f000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01031b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 148.639124][T16513] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 148.639249][T16513] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 148.639277][T16513] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002f, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010006, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 148.735593][T16548] FAULT_INJECTION: forcing a failure. [ 148.735593][T16548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.748714][T16548] CPU: 0 PID: 16548 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 148.757130][T16548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.767191][T16548] Call Trace: [ 148.770542][T16548] dump_stack_lvl+0xb7/0x103 [ 148.775155][T16548] dump_stack+0x11/0x1a [ 148.779389][T16548] should_fail+0x23c/0x250 [ 148.783884][T16548] should_fail_usercopy+0x16/0x20 [ 148.786161][T16553] loop0: detected capacity change from 0 to 264192 [ 148.788908][T16548] copy_page_from_iter_atomic+0x2c1/0xba0 [ 148.788942][T16548] ? shmem_write_begin+0x7e/0x100 [ 148.806145][T16548] generic_perform_write+0x1ef/0x3d0 [ 148.811503][T16548] __generic_file_write_iter+0x174/0x310 [ 148.817220][T16548] ? generic_write_checks+0x250/0x290 [ 148.822595][T16548] generic_file_write_iter+0x75/0x130 [ 148.827998][T16548] vfs_write+0x77d/0x8c0 [ 148.832317][T16548] __x64_sys_pwrite64+0xf5/0x150 [ 148.837307][T16548] do_syscall_64+0x3d/0x90 [ 148.841733][T16548] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.847728][T16548] RIP: 0033:0x419797 [ 148.851623][T16548] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 148.871320][T16548] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 148.879929][T16548] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 148.887898][T16548] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 148.895867][T16548] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 148.904791][T16548] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 148.912788][T16548] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 148.921277][T16553] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:53:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000020006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 148.930427][T16548] loop1: detected capacity change from 0 to 264192 [ 148.945836][T16548] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 148.955508][T16553] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 148.974910][T16553] System zones: 0-2, 18-18, 34-35 [ 148.983492][T16548] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 148.997164][T16553] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 149.008265][T16553] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.021865][T16548] System zones: 0-2, 18-18, 34-35 18:53:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000030006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:29 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 149.027485][T16548] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 149.038849][T16548] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.058176][T16579] loop5: detected capacity change from 0 to 264192 [ 149.070183][T16580] loop3: detected capacity change from 0 to 264192 18:53:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010402, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 149.087410][T16579] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 149.096943][T16580] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 149.106785][T16579] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 149.124501][T16579] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000040006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 149.136792][T16579] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.158020][T16599] FAULT_INJECTION: forcing a failure. [ 149.158020][T16599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 149.171276][T16599] CPU: 0 PID: 16599 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 149.179496][T16580] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 149.179698][T16599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.197177][T16580] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 149.207346][T16599] Call Trace: [ 149.207357][T16599] dump_stack_lvl+0xb7/0x103 [ 149.207381][T16599] dump_stack+0x11/0x1a [ 149.219523][T16580] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.222766][T16599] should_fail+0x23c/0x250 [ 149.246581][T16599] __alloc_pages+0x102/0x320 [ 149.251199][T16599] alloc_pages_vma+0x513/0x680 [ 149.255970][T16599] shmem_getpage_gfp+0x95a/0x13e0 [ 149.260996][T16599] shmem_write_begin+0x7e/0x100 [ 149.265872][T16599] generic_perform_write+0x1a6/0x3d0 [ 149.271395][T16599] __generic_file_write_iter+0x174/0x310 [ 149.277173][T16599] ? generic_write_checks+0x250/0x290 [ 149.282726][T16599] generic_file_write_iter+0x75/0x130 [ 149.288122][T16599] vfs_write+0x77d/0x8c0 [ 149.292379][T16599] __x64_sys_pwrite64+0xf5/0x150 [ 149.297509][T16599] do_syscall_64+0x3d/0x90 [ 149.301933][T16599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.307840][T16599] RIP: 0033:0x419797 [ 149.311730][T16599] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 149.331376][T16599] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 149.339789][T16599] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 149.347778][T16599] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 [ 149.355754][T16599] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 149.363730][T16599] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 149.371703][T16599] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 149.380138][T16599] loop1: detected capacity change from 0 to 264192 [ 149.392148][T16599] EXT4-fs error (device loop1): ext4_fill_super:4809: inode #2: comm syz-executor.1: iget: root inode unallocated [ 149.404657][T16599] EXT4-fs (loop1): get root inode failed [ 149.410369][T16599] EXT4-fs (loop1): mount failed 18:53:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000050006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010030, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0xfffffffe}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x80) write(r2, &(0x7f00000000c0)="b4", 0xfdef) fcntl$setstatus(r2, 0x4, 0x2000) close_range(r1, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/ipc\x00') socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x227c, &(0x7f0000000080)) r4 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x227c, &(0x7f0000000080)) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r5, 0x227c, &(0x7f0000000080)) syncfs(r0) mmap(&(0x7f000019e000/0x4000)=nil, 0x4000, 0x1800003, 0x2010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 149.494872][T16630] loop0: detected capacity change from 0 to 264192 [ 149.496631][T16634] loop3: detected capacity change from 0 to 264192 [ 149.509158][T16632] loop5: detected capacity change from 0 to 264192 [ 149.527284][T16644] FAULT_INJECTION: forcing a failure. [ 149.527284][T16644] name failslab, interval 1, probability 0, space 0, times 0 [ 149.539982][T16644] CPU: 1 PID: 16644 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 149.540005][T16644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.540033][T16644] Call Trace: [ 149.540040][T16644] dump_stack_lvl+0xb7/0x103 [ 149.540065][T16644] dump_stack+0x11/0x1a [ 149.553148][T16630] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 149.558532][T16644] should_fail+0x23c/0x250 [ 149.558563][T16644] ? xas_create+0x3fb/0xb30 [ 149.558584][T16644] __should_failslab+0x81/0x90 [ 149.562156][T16630] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 149.566427][T16644] should_failslab+0x5/0x20 [ 149.566450][T16644] kmem_cache_alloc+0x46/0x2e0 [ 149.566467][T16644] xas_create+0x3fb/0xb30 [ 149.573613][T16630] System zones: [ 149.579916][T16644] xas_create_range+0x146/0x360 [ 149.584363][T16630] 0-2 [ 149.588814][T16644] shmem_add_to_page_cache+0x3ad/0x650 [ 149.593575][T16630] , 18-18 [ 149.601502][T16644] shmem_getpage_gfp+0xb95/0x13e0 [ 149.606092][T16630] , 34-35 18:53:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000060006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 149.610814][T16644] shmem_write_begin+0x7e/0x100 [ 149.615146][T16630] [ 149.618652][T16644] generic_perform_write+0x1a6/0x3d0 [ 149.654708][T16644] __generic_file_write_iter+0x174/0x310 [ 149.654744][T16644] ? generic_write_checks+0x250/0x290 [ 149.654768][T16644] generic_file_write_iter+0x75/0x130 [ 149.654791][T16644] vfs_write+0x77d/0x8c0 [ 149.654814][T16644] __x64_sys_pwrite64+0xf5/0x150 [ 149.654844][T16644] do_syscall_64+0x3d/0x90 [ 149.654868][T16644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.654917][T16644] RIP: 0033:0x419797 [ 149.654931][T16644] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 149.654949][T16644] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 149.654971][T16644] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 149.654985][T16644] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 18:53:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000070006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 149.654997][T16644] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 149.655009][T16644] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 149.655021][T16644] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 149.658978][T16632] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 149.773219][T16630] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 149.773249][T16630] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.782858][T16634] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 149.812628][T16634] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010406, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 149.817830][T16632] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 149.830212][T16634] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 149.847749][T16632] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 149.859807][T16634] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.871932][T16632] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 149.886126][T16644] loop1: detected capacity change from 0 to 264192 18:53:30 executing program 2: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x0, 'none\x00', 0x8, 0x5, 0x24}, {@empty, 0x4e22, 0x4, 0x200007, 0x1, 0x1}}, 0x1f) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190019000400ad000200000000000006040000000000000000", 0x39}], 0x1) 18:53:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010008, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000080006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010031, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 149.977141][T16680] loop0: detected capacity change from 0 to 264192 [ 149.989806][T16681] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 150.016749][T16689] loop5: detected capacity change from 0 to 264192 18:53:30 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x24000, 0x0) r1 = syz_io_uring_setup(0xb9, &(0x7f0000000980)={0x0, 0x0, 0x8, 0x0, 0x0, 0x0, r0}, &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000a00)='fdinfo/3\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r3, &(0x7f00000001c0)) preadv(r2, &(0x7f0000000140), 0x0, 0x0, 0x0) 18:53:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000a0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 150.024561][T16693] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 150.033903][T16644] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 150.085917][T16644] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 150.090806][T16680] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 150.103339][T16680] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 150.111647][T16689] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 150.115651][T16644] System zones: 0-2, 18-18, 34-35 [ 150.127992][T16689] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 150.141366][T16644] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 150.145635][T16689] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 150.156726][T16644] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:30 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000580)="0201a5ffffff0a000000ff45ac0009c3ffff82000800000000e2ff00024000ffffffbf000000e10000008877360000000700557d88971c46faea00000000000000008000da55aa", 0x47, 0x1c0}]) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x80000001, 0x2, &(0x7f00000004c0)=[{&(0x7f00000003c0)="5922546fc279c93d48afc2a8f432bd62a30f05011ac6fb41318f7b02d8c761387b79eba8b1a44884701285f0b4aa46b548993c5acca13ad1ebd581666098de6ca495e3eb94baa0f260f7acc77bd7b5cc2e0bcefb6fb35a813f8df6190148f79baddb79974637ccac86e0a53315630336d01f4c302fee9adff831c4ffafcd04c8d33cfa0e689dc1e50621552f85c9dffed9a65739e76d1e22e243f0b0b69947d5eedb222e70a929dd70fcb72b15f3518ac0792dbfb73572cd49527aeb8cfd02f6", 0xc0, 0x1}, {&(0x7f0000000480)="29880a698886a5f4b85607fbba6a5852d326ed4d933c03a8", 0x18, 0x4}], 0x0, &(0x7f0000000500)={[{@i_version}, {@data_err_abort}, {@resuid={'resuid', 0x3d, r1}}, {@delalloc}, {@user_xattr}], [{@uid_eq={'uid', 0x3d, r0}}]}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x80000001, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="6db6658b96a4e75b06f86b0374b1327f58efe67b29d0030c73706fe00792beba15f46395993c6a84bb7b0bcbd0450ea735173bc5042137865678bc43a315e3e2900b2ba75f9066e0eca8e98d0154d55b80", 0x51, 0xfdd}], 0x21, &(0x7f0000000280)={[{'&'}, {'$\xdf@#_'}, {'!%'}, {'-}^{'}, {}, {'('}, {'}+}/'}, {')\''}, {').*-@{\\^$\x9d],:^%}:'}, {'}-\xd2/#,+@.@'}], [{@obj_type={'obj_type', 0x3d, '.&'}}, {@smackfsdef={'smackfsdef', 0x3d, ','}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@subj_user={'subj_user', 0x3d, ':'}}, {@permit_directio}, {@euid_eq={'euid', 0x3d, r2}}]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000600)={0x30000, 0x166, 0x11}, 0x18) [ 150.179544][T16689] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 150.192436][T16708] loop3: detected capacity change from 0 to 264192 [ 150.207951][T16680] System zones: 0-2, 18-18, 34-35 [ 150.223350][T16708] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:30 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000b0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 150.236374][T16708] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 150.240774][T16680] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 150.253930][T16708] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010410, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010032, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 150.264955][T16680] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 150.287772][T16708] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010009, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000200000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="450fdba19798ed530eb230627b9ccb6895f0a6f878d6c270c8a564e14aaf9610f2eb27e3c6b0550572b7a4c4cc83ad6c687b16f9c24d883ed3b099014d20bb080d90c5bf8f20ad65fa186dceef94d0fda2dcc5b4bb7067681ef8ff93cb50e43f78d0c04a03de636d435ff056abb39a91117f00000026fd1d22012bcef35b9b966a69ed3f43"]) 18:53:30 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x7, 0x0, 0x0, @tick, {}, {}, @ext={0x169, &(0x7f0000000200)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) clone(0x48040080, &(0x7f00000004c0)="802dbb2e068a904af1719f6ad806bf8d8663ffe7dab9aab4ada7e2adaf1e68d251cc60af9cc9f93c27ac2ad8d48508680aa4d441c3aedcf8aa08f732eb71e23db5d228164af15dd90c95d38e47a7558e6e2a435b6fccd226ef010a8bb955baf388ad71f3943f6f062c3a34c7ff4f30841eaa3b4e9aa1f4837957922db1e4c6b3cb8972f1765b3917c6169a3e0de84851b199b2c154e7d8d995f89ef6a13f626a28ab85dc605d6d554c6d5385356474cfb620a51f4b48dfd7296b46060588612e57fe2793d63d671ab1d75ab3d408cd3100de", &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="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") tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x34) clone(0x108000, &(0x7f0000000140)="56e7116704a848b9519a209e8afd2ca0ae6b6f752f6d7c8713840345e92c59775739d09bffc9b6e5e0c134933e15445ab17a19b4964c86406a1d9a70b4b4462daa4e234d6fb11961b87e688a6db67dedfd1ea47c384ac3d6fdab64ea4dde7b75b48d6a499e67a3b6fd1e7f209b824fdc78377786ad5794e7fc2adb4ed0366fb2407be466f3d4b916a565c235106831e98c1a20c4be9782d4f678ba1f346ce7cb3c8dd9b982014dd6e19f32632c4d413896ade59a07af340f044421dc9764f7", &(0x7f0000000080), &(0x7f0000000380), &(0x7f00000003c0)="44c048d9e9f76f46aa410d081638fa900fac2e81446bc0f852f1c90ebcb1942677e70b8a8fc7d51810dc7b7a3c66797a8c94668162af53d19313a012d19f9d5c9662f041edf24bcb5205ea48a17d58cc79f2d6de5f35831e70e6c78c5f9fcb5d0b62eb041f2fcafd30b36d1b85c55b6347ca00aa931b1a816fcbd89f6ac4f3cc01dca0b75874c26d4c8889ef1804415ebdce0f9336609c95aa9cb8af42622a455780baacfd9830eb826b1360d68d136ac13c98a2429c29d7015224c4f41108c7cbbc32357e95182f5d8367") [ 150.359670][T16733] FAULT_INJECTION: forcing a failure. [ 150.359670][T16733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.372883][T16733] CPU: 1 PID: 16733 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 150.381291][T16733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.391427][T16733] Call Trace: [ 150.394705][T16733] dump_stack_lvl+0xb7/0x103 [ 150.399201][T16739] loop0: detected capacity change from 0 to 264192 [ 150.399309][T16733] dump_stack+0x11/0x1a [ 150.410030][T16733] should_fail+0x23c/0x250 [ 150.410187][T16739] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 150.414516][T16733] should_fail_usercopy+0x16/0x20 [ 150.414538][T16733] copy_page_from_iter_atomic+0x2c1/0xba0 [ 150.426121][T16739] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 150.428666][T16733] ? shmem_write_begin+0x7e/0x100 [ 150.428692][T16733] generic_perform_write+0x1ef/0x3d0 [ 150.428717][T16733] __generic_file_write_iter+0x174/0x310 [ 150.435690][T16739] System zones: [ 150.442390][T16733] ? generic_write_checks+0x250/0x290 [ 150.447627][T16739] 0-2 [ 150.453012][T16733] generic_file_write_iter+0x75/0x130 [ 150.458735][T16739] , 18-18 [ 150.462237][T16733] vfs_write+0x77d/0x8c0 [ 150.467708][T16739] , 34-35 [ 150.470257][T16733] __x64_sys_pwrite64+0xf5/0x150 [ 150.475613][T16739] [ 150.478510][T16733] do_syscall_64+0x3d/0x90 [ 150.485494][T16739] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000180006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 150.485656][T16733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.490591][T16739] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 150.492877][T16733] RIP: 0033:0x419797 [ 150.492891][T16733] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 150.492907][T16733] RSP: 002b:00007ffa352f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 18:53:31 executing program 2: epoll_create1(0x0) r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x12, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, @perf_bp, 0x11010, 0xfffffffffffffffe, 0x0, 0x5, 0x1f, 0xfffffffe, 0x0, 0x0, 0xa1}, r0, 0x8000b, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') r1 = socket$inet(0x2, 0x3, 0x2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000009, 0x2030, 0xffffffffffffffff, 0xb5b5c000) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="effe1848b7a13c8124f14b4212ab5e07b495a09c10"]}, 0x8d) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) io_submit(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendto$inet6(r2, &(0x7f0000000400)='\t', 0x1, 0x20042041, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @local, 0x3}, 0x1c) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xef) close(r2) [ 150.492964][T16733] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 150.564683][T16733] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 [ 150.572655][T16733] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 150.580620][T16733] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 150.588592][T16733] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 150.605069][T16730] loop3: detected capacity change from 0 to 264192 [ 150.615618][T16733] loop1: detected capacity change from 0 to 264192 [ 150.627618][T16730] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 150.642316][T16769] loop0: detected capacity change from 0 to 264192 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080001c0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 150.660743][T16769] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 150.665466][T16765] loop5: detected capacity change from 0 to 264192 [ 150.681985][T16765] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 150.695819][T16730] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 150.704429][T16769] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 150.713523][T16730] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 150.733645][T16730] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 150.735244][T16769] System zones: 0-2, 18-18, 34-35 [ 150.748744][T16765] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 150.750335][T16769] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 150.766846][T16765] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 150.777826][T16769] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 150.789967][T16765] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000260006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 150.811450][T16733] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 150.827945][T16733] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 150.836167][T16733] System zones: 0-2, 18-18, 34-35 [ 150.841571][T16733] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:31 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010033, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000fe0006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 150.852686][T16733] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000040206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xdfa6e1b2470d5aca, 0x80010, r1, 0x82a06000) r2 = open$dir(&(0x7f0000001180)='./file0\x00', 0x0, 0x4c) openat(r2, &(0x7f00000011c0)='./file0\x00', 0x600100, 0x21) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xc55cbc2c7c06e911, 0xffffffffffffffff, 0x9b747000) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000001080)=""/232, 0xe8) [ 150.953290][T16813] loop0: detected capacity change from 0 to 264192 [ 150.971354][T16824] loop5: detected capacity change from 0 to 264192 [ 150.972032][T16826] FAULT_INJECTION: forcing a failure. [ 150.972032][T16826] name failslab, interval 1, probability 0, space 0, times 0 [ 150.990491][T16826] CPU: 1 PID: 16826 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 150.998903][T16826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.009219][T16826] Call Trace: [ 151.012415][T16824] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 151.012497][T16826] dump_stack_lvl+0xb7/0x103 [ 151.026937][T16826] dump_stack+0x11/0x1a [ 151.031104][T16826] should_fail+0x23c/0x250 [ 151.035605][T16826] ? getname_flags+0x84/0x3f0 [ 151.040309][T16826] __should_failslab+0x81/0x90 [ 151.045114][T16826] should_failslab+0x5/0x20 [ 151.049645][T16826] kmem_cache_alloc+0x46/0x2e0 [ 151.051645][T16824] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 151.054405][T16826] getname_flags+0x84/0x3f0 [ 151.054431][T16826] ? vfs_write+0x5e0/0x8c0 [ 151.071925][T16824] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 151.076386][T16826] getname+0x15/0x20 [ 151.076411][T16826] do_sys_openat2+0x5b/0x290 [ 151.080806][T16824] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 151.092914][T16826] __x64_sys_openat+0xef/0x110 [ 151.092935][T16826] do_syscall_64+0x3d/0x90 [ 151.121103][T16826] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.127019][T16826] RIP: 0033:0x4196e4 [ 151.131000][T16826] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 151.151069][T16826] RSP: 002b:00007ffa352f3ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 151.159477][T16826] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 151.167455][T16826] RDX: 0000000000000002 RSI: 00007ffa352f4000 RDI: 00000000ffffff9c [ 151.175431][T16826] RBP: 00007ffa352f4000 R08: 0000000000000000 R09: ffffffffffffffff [ 151.183449][T16826] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 151.191424][T16826] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 151.203546][T16813] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 151.213508][T16825] loop3: detected capacity change from 0 to 264192 [ 151.230836][T16825] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 151.240520][T16813] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 151.249312][T16813] System zones: 0-2, 18-18, 34-35 18:53:31 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x400, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000030000000200000000000000ffffff7f0000000008000000000000006fe3462f0000000000000000007383da8000000000000000000000000000000000000000000000000300"/144]) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = signalfd(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_subtree(r0, &(0x7f0000012780), 0x2, 0x0) sendmmsg$unix(r3, &(0x7f00000128c0)=[{{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002ac0)=[{&(0x7f00000015c0)="31037f8588d8ff53fd2d15b5a7136448c6a48e10d8c2b1e3838d7621280609ed649b62a794beb1978e2320aeaa53ed1b84ef4a35beca704283cce8bdd9b8fea658273d", 0x43}, {&(0x7f0000001640)}, {&(0x7f0000002640)="ab54201d575cdda0f2f9a5b668f575f519077074a116e830b2f743d7a03e76aac607a7da5b58832556230627a872fce6bda2463d67a7fe64588dda53f45357bb", 0x40}, {&(0x7f0000002680)="fb4d0e400533a7d1b4224303fa6b719f2592585cf9a0cd740c96251fa9ce", 0x1e}, {&(0x7f00000026c0)="45643d519c9cef5e232245d9c2c403847502551cabd4edf5928ead390b802d926dddac7ddb94bc633e29646ba9cbbb0d6969251cdeff8af89d0d341707b14f430bb0fadad449da56", 0x48}, {&(0x7f0000002740)="a1ae47134ad7ae7453ac04969a4c3d24864e8020c9d193b3db", 0x19}, {0x0}, {&(0x7f0000002840)="7f493637c2b4cfc93ed5ab792964d2e1ec240e7d6933aa06b744462f3b5de9474e84f7825eee52a10a93db9c104a757f3ee65ac9409e23b24580d1c6e4bc8d3a31e9e3f2aeab6b4802719e8b19915c3cbcdedc77d7a12f91fffe58ee51c1ff170de5417b78eb88a890fa337ad1d873bc9077a4702cdec0e480fe2c13e77f0d7bad15867e3a19c11ceb1c49d686b9d9e758e4881e6332e2791ad120dda07a1687e87c2690312104206e0a69809ee76d678b48e47c1c36966cda5c6b59b1f477a4f4c69f83ce70389f0ae0ac7875216471831d27cdb3fd5f5ea0a638a9e5f26fb2defc63ff097b0f04dc5f2c478a1c", 0xee}, {&(0x7f0000002940)="da47e90435b380eecf5e2358ab0beb70fef72cd2d065ad133762f22690e959c0346c7a3bbc204168646803d52304a055f9ba349c13013ca60089aa6d8cf98636aca719c838b016a58f09ddf12cf64a6c3478e97679a9a4e0d8edaf72629822f794270d561a5536040fda08b136705bc7b47beaabefa9e0e0430a09e82b9648f163ae42", 0x83}, {0x0}], 0xa, &(0x7f0000002f00)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r3, 0xffffffffffffffff]}}], 0xd0, 0x80}}, {{&(0x7f0000003000)=@abs={0x1}, 0x6e, &(0x7f0000003300)=[{&(0x7f0000003080)="98c11bfb90ff6400f60e65f44871d0", 0xf}, {0x0}, {&(0x7f0000003180)="30699c0cdf509ca9e470d2871b4e26a83d6d9070ddfc35bb2d65af8836061103de57bf2e3ea1b59451fc504b10b298911859d22b0a1d5df2bc7f4a92ce1336996e0480e4d176a5f8ee0e96574a922852a1a71ef594eb5622aea011c54cb61cd4e8a94e56ef4ac777307a9416a766fcf396a28c251f5c815c4fe27babad702e8d5f", 0x81}, {&(0x7f0000003240)="21f1e07bbc74fc3e7620a49561ab009101961794c0da31ef3abbce81e04650a19435cefd7862b859c8f5a1c1cf", 0x2d}, {&(0x7f0000003280)="f8c63f93139fa6e1179e601fee5c3150298088e20781e1e28012f96d9cbd930675b752a3041e4efc327afdb3d065b57f9ba786bfc4a6e4e9a28fbd73928232795e871615d72d96b23bc1a1f66b4a1d35935d7541929ac44aaa879b8d5c00b1", 0x5f}], 0x5, 0x0, 0x0, 0x4}}, {{&(0x7f0000003380)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000057c0)=[{&(0x7f0000003400)="229e462d1168b9822973b3d07006909eb7b095cfc8e343e471136e3b91f1f134936ccdaf019046f92c175e5741876d32ffc3c550f5b429b142fb08aab7d5ed4102737c211c57bd8ba4e5eedba5690f78e94f93416a7ada675d0e5383d8a211881fba74eb57bf69cb05387b69e04c4e0fe2c091f2ab6591f8a47c89094c02f4fd68df183a1ee025fe8dfeb3c8275dc8529ef7a6a27ec8d9ff38783606bbb0e27fe567c58f33e8198d2ade3d4c18959ccdc8ea3e78b30d07cb0f56f3d51dcd00d0a07f3da4e3c80bb6385a6bc61d73690cba8e274f9e96d513fcffe141b3a065cbbc1a8348b2b2e3", 0xe7}, {&(0x7f0000003500)="9edb19db8361e3585cc34934e1e284f5ed96baa8d498d7bc00b0c1525b32b7a32c05a31d27b022a27c277b1d9fd07d98b5b2496348ca9bc8bfeb17e0be5b1ae2854a4b687899b5c4d569bbe1e0e3a3118731df5dd694db3d3056c1d3b15e6c6f60b733eedcff45e1ca3c4f5af8721ff6e23e27b61ca80901a9656d74973859198e9e16a6b647228dbef5cf29360ec3f34611c02bde77628467afe83f50e81a531d9acf98b910d2518966910d2aec76bd7947decec4c545359a33c79e245a5c875bb1b26821110c45841d", 0xca}, {&(0x7f0000003600)="f909e7523a8b8fb6406229963f0ab4a31e60cf3025c55788ce5181c58e4577fedab4b0bc2320e5690bcd89d56caf975d14a6109f8823cb3fc6ebaa77b599dc336c68024c80bd9aee7dcf8016efc9bfeb338588133c92ed23d24ca822b5305df9e1f17c4a11ee45ace524b525afa0d9a5b6e554c54b658424eac00712dd20ab3d339dad7c4995f6f0132612c487a7101514c8c5e88612f4d73093770278773205678ea81e1344acd5fe9d8c0edca508dd22e6d3c65245b754d3589fd07248b159084bc8551f8f08da49b3ef3dbf8516236226224b88992d5ddd", 0xd9}, {&(0x7f0000003700)="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", 0x1000}, {&(0x7f0000004700)="3dc0b21bc2bc5e965c33f6b75ff61b9d4feba083f39106629f7803aae8b8f1030503f00477acd66975ebf04909ab2ff6b2d43974799f6ba040f0c7c6046b6c070d058cfe1cd9d6601cba73ab9313bf0b5825", 0x52}, {&(0x7f00000047c0)="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", 0x1000}], 0x6}}, {{&(0x7f0000005840)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005940)=[{&(0x7f00000058c0)="4bc22bd7bf926024877dd889591c6e16404b42c4ff729454c4d330906a3170d706584f02b8e9d737744abe0f8b706bb4b1df0ce08b6f0bbb281b8e2e57c7b7925fb8304b808aa4d1ac6cc934dce6503478bde8d13cef5495809dc9cd2fbae250ed39eb886481a476451861fac9db8e3ef526d8df28848afc22", 0x79}], 0x1, &(0x7f0000002b80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000fdbb3b01beb64fd8420cda3d62cb308b6677e59f3acd42ec85f052259b1f7c1b43c952c041f53ca85e84580b6f92f0f0f9e0d6d7bfa4", @ANYRES32=r3, @ANYRES32=r2], 0x50, 0x20000000}}, {{&(0x7f0000005a00)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000006d00)=[{&(0x7f0000005a80)="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", 0x1000}, {&(0x7f0000006a80)}, {&(0x7f0000006b80)="213572b4adbc9b4838ca7d866cc685ddcb095827bc4ae28207dce7a15b1b429899c1ef71141dfc69a727a5ba9c117a3a94491d4692fcc08d79505506005e786770000c", 0x43}, {&(0x7f0000006c00)="351069bd2c7344b458c304e2e3bcbc65a6658fc3a7f23c5b97e3c8f052c330be57439828a2852f1f97ffacceb0fcd171b33854979d03a1d18295e3d157e311ae5bc36a8f06917e8939915efe0bb77258987774a33cb99b24b6f8880a7abcda1411c61b15a215e385be0f62d85d77447df670e8db7fabafc6a22163fb6d235271670004d3f0294c4c570f8a6b156f15062f4a04f4529191cb495032cb6e4d2171044084a63360394feeb31fd0acd240ff6599a80942a341851c6a17af7189845fca6091746546dc90cdc454ab", 0xcc}], 0x4, &(0x7f0000008f40)=[@rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0xe8, 0x20040800}}, {{0x0, 0x0, &(0x7f0000009280)=[{&(0x7f0000009040)="6e1411b61c1725a663d42cd29ebf6fc18c376bc245ab2ecc72af5875cbcbf1029922e58361a6b0fd804379baec6d3cd879c2af4ac815b025888018c844f252efd0216a37ae41fab9a1c712c68f4b5a283ce9b2e2a0afb0384ad0482a2e6204e01189d5808c2380a6c8c6047a893f4af66e9eb4a9f9ae4e2a10851945402b93b0a78c3ddfc1a5d3ae103e718cf837391d89590bb129b3531c34e5fc31448b7576dbda5463a6b5cd1e9cbb463cc1fa9b4c59dd095a52fc002fb5568ff542faef3570d425b569d4086af8fcd062401f4a65d96257e1c2fa2818d045920b39ee07da0e9d8e8a", 0xe4}, {&(0x7f0000009140)}, {&(0x7f0000009180)="8184be1a0116d0aa9ad33b234ceebe1760136e5b5ac18cbc244fa5191e553377e4dfe5f0834564d95b1f07a541877bf6f9cb76efca214eb20203a479b4850a84027a6decca383402a3097969429bc34695817d5a50829b6376da8d2f3c9f6fe4a186d92650fbcb05df6d212faa50ef8247b8c034477a6f449375962d6c4d41f7809867bf3e4cbba85b06a6902cb4b98d2d60695fc3a60de3a15e1d4ff486bcdb0eb3927d6e06ce092b02fd84cf1ec324e7d590da6583e1ab11a27fa0c95f340d602c5256fb8bdc7af745299059235e41af452b6bd06a73e2c9e55769006c4c88bb25cf39d2ee17a79e40744c4b1b", 0xee}], 0x3, 0x0, 0x0, 0x20000000}}, {{0x0, 0x0, &(0x7f0000009800)=[{&(0x7f00000092c0)}, {&(0x7f0000009340)="5f64d90051e263b241ea94ea1b8a1dbb08db23f5027f6c1cc171b6db515979b3b93bfe83a5419f8178f18300c6280abf0fddbcfc8447d50d251c55e67830f5d3b1db06d921c4f9defc9a6c4b6358c2d86fa02cbcad578eadf7334819cea6383d68bc2e6973cd757c06d5a352a5e46d", 0x6f}, {&(0x7f00000093c0)="40da44f73d71e5d5ea7621ea02a16c938eb2512fd913307d378e8f57370d14b1fa8369aa3621ea63bc398576613e08278bc393a59311f165cd", 0x39}, {&(0x7f0000009400)="e9797b54865fe648fa5c59928f7a7b025e9344b2b186b44220952aaee816b864906eca970375cb7eed407e1a543dcb45564eefd599e640cd356337ef651ddc95fca7d0f833eb88fa0f21222055be130b3099396c528eeff3368688f18799f5a523fc0c", 0x63}, {&(0x7f0000009480)="ff58fb56a4c26f52041da0ee66a3af5f184f6d2b3321842537ac1b0670de8aa39cc397d2f85dd169f1496d6f996bfcc3a2c6cf50041fe7cbd642514486b3deaa52d54a0463fe15d9372e91f6da13aaa526eff351f38db4c6731e28d3a0df97", 0x5f}, {&(0x7f0000009500)="6de561a85b7d79f6e0384407a6620aef482df42d8eabab686471e6ff0924dfbd7c1b0bb0159f4ecea3f3b670b8a114955ff0af18c32598481c6e22aa85a912882c50edff186079bf69b883a65784e4b566bd8041671f54e1863f3e565430277ea255a28bdb3b6db4ef6de9c1dd2d0525a24c812d6080a89cb0c930b8baf050403a81ebf2153456af84134e6f39a837d3163024a4651ffe1df5d799966e41925038e83d5a1f76b38995669c", 0xab}, {&(0x7f00000095c0)="2093195cf92e6c2df9e67c65c630cd9b0e042aec6da8ed84f1917c48c4eae7c576529234b12182e06460c7e158092ecc63268514c3b1b1a860b3308cb5888b", 0x3f}, {&(0x7f0000009640)="1306dba13b164dedd92be9d99c78b577fc79f710a71393e22c65f9a2425723f83192ccd085852b5013f877880433259052be45e6fe91f1c3819b7b22264c936ab8880a5683f2d2cd08", 0x49}, {&(0x7f00000096c0)="91", 0x1}, {&(0x7f0000009700)="196b93a5c2041ee44546d83c468db03e66e5f60adab9f0bc7b4e96e3522be7b9ee66973f29ff67d5ce1ff0322f6fc2b41fe0225cb13a894b1c2383b2e563972670d7da44f85ffea04fcf1e1ce399eac35d5f5fb2471d42c6e026499b2968bd002be1bfe81479e5b7dd197758e60d081b34669e654b5aef32f350bb17de912053fc1c2b38bfbd9f98bfb389880c2c4e5e4aed4d0443503c805e21fc93bf40d648cf9fb33af442c09843ff00950b2944a84d9a6b13f34f5a12c4a6f07930018c3114e9482de5c2ca2b982b0134dd0077ca5134a7890681263e8853", 0xda}], 0xa, &(0x7f0000009a40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x60, 0xe0}}, {{0x0, 0x0, &(0x7f000000bc00)=[{&(0x7f0000009ac0)="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", 0x1000}, {&(0x7f000000aac0)="5b5fc46f6d119ecde25033c1d5c048ca8e9fde6faa8c66c449dca4434ee068620be54496efebd0bd8d53ec67fa8d17adf7484ff848185922cd0168d42f8d42c63ed4d3bba79b21becde069d27a95c70795e4025c66b522a9d26df9298ac891cf662d0d0d2642e91d5940e262c6722e541d9963478e295f5e84f42b07614a21a342177c3aa92dc12fa651bf0a7876f607bb19445540001322b06c950e9efd0cdddccde36f30d0d03f06bb96728f29315e84617602f450846b0eb17da60f203b78de", 0xc1}, {&(0x7f000000abc0)}, {&(0x7f000000bbc0)="4a14a387f48bf77922e193150215a34bc3", 0x11}], 0x4, &(0x7f000000be00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x60, 0x8010}}, {{&(0x7f000000be80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000bf40)=[{&(0x7f000000bf00)="77669a88dc5d", 0x6}], 0x1, &(0x7f000000c240)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x40, 0x6000}}, {{&(0x7f000000c2c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f000000e940)=[{&(0x7f000000d340)="af30b8f936fd995aa2c13ded2a96f3ca28e4", 0x12}, {&(0x7f000000d380)="6e2f0647a58e602764ca7ff4d58c81909edba14f2d3086d550009c848bfd8025d4f2895f92dc954a398bef3f9202671fe04e4c4f2e99396e7228a2bf61a57824c05f57dec1fce54fc16839b11b6f40f3799e6b0aaf2d5da774cb4965bc3a9c811e5b65249685ccaf999dfc93e55a107653190505c7aa406657ae70214c6bc97e93baa020d791edcb29859f528ae9727d506791c46e2171feac", 0x99}, {&(0x7f000000d440)="9bbb8a9e92b06e4445007cf1d2b6102c81c7e414ffd38969b3a07b587440d50dc0b94688ec8c8abc05e8e6fd33dcadd2ad58805f66b83376e35a2aa0ea887d4285c0a2a187cd4027d46dadd5448dd9ca3b4ee36ac4ced8c9bc28c4076c70028a9ab2ff6d08e79a667ca557c41bd9f5cf9c48f1cafb9bfa3f4d3236c1d1ecc5ce6c6bbf52637e768106d9ccd1c7c9e4", 0x8f}, {&(0x7f000000d500)="540ccdc0573564385a02a7512a5088c0e57b9b4e8d6239b829accfabea02c3d6503b981000e6b1ce394cd6aacc5efe58f721a9d033a5709ea1f6ee55b30f591da6c1962c32fc358413ef378774c9d2bbc0be3f646a9d2a209845d63da228a4c8cf91a794556f17ca106285c5ef1cdf1a486b0d552c4bf5a58bc24e85a7448d9b47496cf91b6e1d349ad05a27bbd7c94ade5682e7cebfc9dd258e80de", 0x9c}, {&(0x7f000000d680)="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", 0xf79}, {&(0x7f000000e680)="01f49130ffdeb6a824452966daa93235c6d846ffd02a9a7a4c59965e2542e74dc1c48fee1de6a5e5125a2df06f0bb36e1174e485c3b8218219808b632abd4dd73f7b64401853a5872ffbc3c9969112ad306e1ac849f6fcf306d33df04c9ba56285f66b51e3b987f5b3ba0189d8ed952bc5a4f884b94fbcc06e4fd59b2f308175c5c040c553deef53eb063b4cac3a606e21b7a40eb9fa95db9477202d8762c15e6b50", 0xa2}, {&(0x7f000000e780)="43dfea986e8f64b73b85fc482c7ffbbc913c881e51f793428b0623ee6a18ed2d62f51f502e82a7ceb1f5ec5d6de84d564306bdcabd34764215defb0df0a4a8fad1", 0x41}, {&(0x7f000000e840)="53ad37fe8fbad7871e34a9825bd004777f4011d89b3a90681597c2edafc76f070ad889bfe75d19a44683ffbc25f0df39bc5c8ea61e0646068fc3b0a8c01224624be899138efd1872df3edf3fe13b7951f00098cb910a942057e5d823a20e8754010381a10f675ae0df5557e3b2af64212bc5298b74518a631460727a90a65ac978cf515155ebfe915f7ab640de1c1968bed3582f26cb76fb8a2093df1cb93504ed1da91570a65d91c1dd77c6", 0xac}], 0x8, &(0x7f00000127c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [r2, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r3, r4]}}], 0xd0, 0xc045}}], 0xa, 0x49) close(0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000001400)={0x0, 0x80, 0x77, 0x0, 0x2, 0x7, 0x0, 0xc0e, 0x1, 0x7, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x83, 0x4, @perf_config_ext={0x4, 0x101}, 0x40, 0x7ff, 0x8, 0x6, 0x100000001, 0x6b465bd5, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xc, r1, 0xa) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000300)=r5) r6 = gettid() signalfd(r3, &(0x7f0000000280), 0x8) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x9, 0x1, r6}) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x3) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, 0x6, 0x3) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x4400, 0xac) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 18:53:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000020406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 151.255173][T16813] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 151.266238][T16813] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010604, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 151.304054][T16825] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 151.321623][T16825] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 151.333884][T16825] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 151.380725][T16860] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 151.389166][T16860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 151.401811][T16864] FAULT_INJECTION: forcing a failure. [ 151.401811][T16864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.415078][T16864] CPU: 0 PID: 16864 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 151.418830][T16870] loop0: detected capacity change from 0 to 264192 [ 151.423666][T16864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.423680][T16864] Call Trace: [ 151.423686][T16864] dump_stack_lvl+0xb7/0x103 [ 151.448411][T16864] dump_stack+0x11/0x1a [ 151.452656][T16864] should_fail+0x23c/0x250 [ 151.457084][T16864] should_fail_usercopy+0x16/0x20 [ 151.462112][T16864] strncpy_from_user+0x21/0x250 [ 151.467000][T16864] getname_flags+0xb8/0x3f0 [ 151.472065][T16864] ? vfs_write+0x5e0/0x8c0 [ 151.476950][T16864] getname+0x15/0x20 [ 151.480901][T16864] do_sys_openat2+0x5b/0x290 [ 151.485497][T16864] __x64_sys_openat+0xef/0x110 [ 151.490436][T16864] do_syscall_64+0x3d/0x90 [ 151.494866][T16864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.500805][T16864] RIP: 0033:0x4196e4 [ 151.504741][T16864] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 18:53:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010034, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000060406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 151.524347][T16864] RSP: 002b:00007ffa352f3ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 151.532761][T16864] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 151.540734][T16864] RDX: 0000000000000002 RSI: 00007ffa352f4000 RDI: 00000000ffffff9c [ 151.548709][T16864] RBP: 00007ffa352f4000 R08: 0000000000000000 R09: ffffffffffffffff [ 151.558073][T16864] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 151.566048][T16864] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:32 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 151.593695][T16870] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 151.604405][T16880] loop5: detected capacity change from 0 to 264192 [ 151.630899][T16870] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000800406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 151.635597][T16891] loop3: detected capacity change from 0 to 264192 [ 151.655962][T16887] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 151.662940][T16870] System zones: 0-2 [ 151.664165][T16887] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 151.677272][T16870] , 18-18, 34-35 [ 151.685165][T16900] FAULT_INJECTION: forcing a failure. [ 151.685165][T16900] name failslab, interval 1, probability 0, space 0, times 0 [ 151.697312][T16891] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 151.697865][T16900] CPU: 0 PID: 16900 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 151.715252][T16900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.725345][T16900] Call Trace: [ 151.728620][T16900] dump_stack_lvl+0xb7/0x103 [ 151.733200][T16900] dump_stack+0x11/0x1a [ 151.737415][T16900] should_fail+0x23c/0x250 [ 151.741829][T16900] ? __alloc_file+0x2e/0x1a0 [ 151.746507][T16900] __should_failslab+0x81/0x90 [ 151.751253][T16900] should_failslab+0x5/0x20 [ 151.755744][T16900] kmem_cache_alloc+0x46/0x2e0 [ 151.760552][T16900] __alloc_file+0x2e/0x1a0 [ 151.765099][T16900] alloc_empty_file+0xcd/0x1c0 [ 151.769878][T16900] path_openat+0x6a/0x1e90 [ 151.774347][T16900] ? copy_page_from_iter_atomic+0x44b/0xba0 [ 151.780260][T16900] ? set_page_dirty+0xf4/0x1a0 [ 151.785009][T16900] ? shmem_write_end+0x37d/0x3d0 [ 151.789954][T16900] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 151.796303][T16900] ? generic_perform_write+0x35d/0x3d0 [ 151.801748][T16900] do_filp_open+0xe9/0x200 [ 151.806148][T16900] ? __virt_addr_valid+0x15a/0x1a0 [ 151.811244][T16900] ? _find_next_bit+0x16a/0x190 [ 151.816162][T16900] ? alloc_fd+0x388/0x3e0 [ 151.820526][T16900] do_sys_openat2+0xa3/0x290 [ 151.825100][T16900] __x64_sys_openat+0xef/0x110 [ 151.829856][T16900] do_syscall_64+0x3d/0x90 [ 151.834284][T16900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.840170][T16900] RIP: 0033:0x4196e4 [ 151.844044][T16900] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 151.863634][T16900] RSP: 002b:00007ffa352f3ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 151.872037][T16900] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 151.880003][T16900] RDX: 0000000000000002 RSI: 00007ffa352f4000 RDI: 00000000ffffff9c [ 151.887972][T16900] RBP: 00007ffa352f4000 R08: 0000000000000000 R09: ffffffffffffffff [ 151.895924][T16900] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 151.903929][T16900] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 151.918433][T16880] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 151.922155][T16891] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 151.945268][T16891] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 151.957469][T16891] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 151.958653][T16880] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010035, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 2: clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000001dc0)=""/37, 0x23}, {&(0x7f00000001c0)=""/240, 0xf0}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/125, 0x7d}, {&(0x7f00000012c0)=""/205, 0xcd}, {&(0x7f00000013c0)=""/176, 0xb0}], 0x6, &(0x7f0000001500)=""/4, 0xffffffffffffff6f}, 0xf5db}, {{&(0x7f0000001540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000001600)=[{&(0x7f00000015c0)=""/24, 0x74}], 0x1}}, {{&(0x7f0000001640)=@hci, 0x80, &(0x7f0000001c00)=[{&(0x7f00000016c0)=""/206, 0xce}, {&(0x7f00000017c0)=""/192, 0xc0}, {&(0x7f0000001e00)=""/150, 0x96}, {&(0x7f0000001940)=""/52, 0x34}, {&(0x7f0000001980)=""/44, 0x2c}, {&(0x7f00000019c0)=""/95, 0x5f}, {&(0x7f0000001a40)=""/232, 0xe8}, {&(0x7f0000001b40)=""/145, 0x91}], 0x8}, 0xe5}], 0x3, 0x40000021, &(0x7f0000001d80)={r0, r1+10000000}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x509000, 0x0) pselect6(0x40, &(0x7f00000018c0)={0x4, 0x400, 0x200, 0x0, 0xfffffffffffffc00, 0x200, 0x9, 0x4}, &(0x7f0000001900)={0x7ff, 0x400, 0x8, 0x3, 0x8, 0x0, 0x101, 0x6}, &(0x7f0000001fc0)={0x4, 0x0, 0x9, 0x4, 0x2, 0xffff, 0xe894, 0x7}, &(0x7f0000002000)={0x77359400}, &(0x7f0000002080)={&(0x7f0000002040)={[0x3f]}, 0x8}) r2 = socket$inet(0x10, 0x2000000002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in=@private, @in6=@ipv4={""/10, ""/2, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xdc) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000001880)={@empty, @multicast2, r3}, 0xc) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="24000000240007041dfffd946fa201000100000001000000000000e5f1fffffff7fffe7e", 0x24}], 0x1}, 0x0) [ 151.985524][T16880] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 151.995596][T16870] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 151.997701][T16880] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 152.008720][T16870] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:32 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 152.100919][T16920] FAULT_INJECTION: forcing a failure. [ 152.100919][T16920] name failslab, interval 1, probability 0, space 0, times 0 [ 152.113562][T16920] CPU: 0 PID: 16920 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 152.121982][T16920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.125022][T16924] loop3: detected capacity change from 0 to 264192 [ 152.132113][T16920] Call Trace: [ 152.132122][T16920] dump_stack_lvl+0xb7/0x103 [ 152.146482][T16920] dump_stack+0x11/0x1a [ 152.150678][T16920] should_fail+0x23c/0x250 [ 152.155173][T16920] ? security_file_alloc+0x30/0x190 [ 152.160376][T16920] __should_failslab+0x81/0x90 [ 152.165150][T16920] should_failslab+0x5/0x20 [ 152.169652][T16920] kmem_cache_alloc+0x46/0x2e0 [ 152.174452][T16920] security_file_alloc+0x30/0x190 [ 152.179493][T16920] __alloc_file+0x83/0x1a0 [ 152.183940][T16920] alloc_empty_file+0xcd/0x1c0 [ 152.188724][T16920] path_openat+0x6a/0x1e90 [ 152.193154][T16920] ? copy_page_from_iter_atomic+0x44b/0xba0 18:53:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080002f0506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) io_setup(0x204, &(0x7f0000000200)) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) io_submit(0x0, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) sendfile(r1, r0, 0x0, 0x80000000) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000000100)=""/110, 0x6e}], 0x1, 0xb5, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0xb5, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 152.199418][T16920] ? set_page_dirty+0xf4/0x1a0 [ 152.204230][T16920] ? shmem_write_end+0x37d/0x3d0 [ 152.209169][T16920] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 152.215413][T16920] ? generic_perform_write+0x35d/0x3d0 [ 152.220878][T16920] do_filp_open+0xe9/0x200 [ 152.225297][T16920] ? __virt_addr_valid+0x15a/0x1a0 [ 152.230529][T16920] ? _find_next_bit+0x16a/0x190 [ 152.232595][ C1] sd 0:0:1:0: tag#4217 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 152.235480][T16920] ? alloc_fd+0x388/0x3e0 [ 152.245310][ C1] sd 0:0:1:0: tag#4217 CDB: opcode=0xe5 (vendor) [ 152.249582][T16920] do_sys_openat2+0xa3/0x290 [ 152.255922][ C1] sd 0:0:1:0: tag#4217 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 152.260470][T16920] __x64_sys_openat+0xef/0x110 [ 152.269477][ C1] sd 0:0:1:0: tag#4217 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 152.274199][T16920] do_syscall_64+0x3d/0x90 [ 152.283211][ C1] sd 0:0:1:0: tag#4217 CDB[20]: ba [ 152.287600][T16920] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.298622][T16920] RIP: 0033:0x4196e4 [ 152.302508][T16920] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 152.322160][T16920] RSP: 002b:00007ffa352f3ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 152.330574][T16920] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 152.338638][T16920] RDX: 0000000000000002 RSI: 00007ffa352f4000 RDI: 00000000ffffff9c [ 152.346498][T16924] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 152.346692][T16920] RBP: 00007ffa352f4000 R08: 0000000000000000 R09: ffffffffffffffff [ 152.357815][T16924] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 152.363973][T16920] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 152.363990][T16920] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:32 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 152.397820][T16924] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 152.397848][T16924] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 152.417981][ C0] sd 0:0:1:0: tag#4221 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 152.432124][ C0] sd 0:0:1:0: tag#4221 CDB: opcode=0xe5 (vendor) 18:53:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010036, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000040606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 152.432142][ C0] sd 0:0:1:0: tag#4221 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 152.432179][ C0] sd 0:0:1:0: tag#4221 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 152.432194][ C0] sd 0:0:1:0: tag#4221 CDB[20]: ba [ 152.473676][T16949] loop5: detected capacity change from 0 to 264192 [ 152.486228][T16961] FAULT_INJECTION: forcing a failure. [ 152.486228][T16961] name failslab, interval 1, probability 0, space 0, times 0 [ 152.507929][T16961] CPU: 0 PID: 16961 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 152.507995][T16961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.508005][T16961] Call Trace: [ 152.508013][T16961] dump_stack_lvl+0xb7/0x103 [ 152.508084][T16961] dump_stack+0x11/0x1a [ 152.508101][T16961] should_fail+0x23c/0x250 [ 152.508129][T16961] ? kzalloc+0x16/0x20 18:53:33 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 152.508153][T16961] __should_failslab+0x81/0x90 [ 152.508196][T16961] should_failslab+0x5/0x20 [ 152.508215][T16961] __kmalloc+0x66/0x340 [ 152.508232][T16961] ? __d_lookup_rcu+0x39e/0x3e0 [ 152.508256][T16961] ? _atomic_dec_and_lock+0x60/0xd0 [ 152.508275][T16961] kzalloc+0x16/0x20 [ 152.508335][T16961] alloc_workqueue+0x11e/0xaf0 [ 152.508429][T16961] ? mutex_lock_killable+0x9/0x30 [ 152.508452][T16961] ? disk_unblock_events+0x35/0x40 [ 152.508474][T16961] ? bd_prepare_to_claim+0x1e5/0x270 [ 152.508492][T16961] ? loop_attr_do_show_dio+0x70/0x70 [ 152.508514][T16961] ? loop_set_status_from_info+0x35e/0x3a0 [ 152.508536][T16961] loop_configure+0x681/0xeb0 [ 152.508624][T16961] ? terminate_walk+0x263/0x280 [ 152.508641][T16961] lo_ioctl+0x59b/0x1370 [ 152.508711][T16961] ? path_openat+0x18c3/0x1e90 [ 152.508738][T16961] ? putname+0xc6/0xe0 [ 152.508760][T16961] ? ___cache_free+0x3c/0x300 [ 152.508777][T16961] ? blkdev_common_ioctl+0x405/0x10a0 [ 152.508796][T16961] ? selinux_file_ioctl+0x8e0/0x970 [ 152.508882][T16961] ? lo_release+0x120/0x120 [ 152.508962][T16961] blkdev_ioctl+0x1d0/0x3e0 [ 152.508979][T16961] block_ioctl+0x6d/0x80 [ 152.508996][T16961] ? blkdev_iopoll+0x70/0x70 [ 152.509011][T16961] __se_sys_ioctl+0xcb/0x140 [ 152.509028][T16961] __x64_sys_ioctl+0x3f/0x50 [ 152.509044][T16961] do_syscall_64+0x3d/0x90 [ 152.509135][T16961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.509163][T16961] RIP: 0033:0x4663b7 [ 152.509178][T16961] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.509206][T16949] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 152.509234][T16961] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 152.509253][T16961] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 152.509267][T16961] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 152.509281][T16961] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 152.509294][T16961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 152.509307][T16961] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 152.513694][T16949] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 152.600039][T16975] FAULT_INJECTION: forcing a failure. [ 152.600039][T16975] name failslab, interval 1, probability 0, space 0, times 0 [ 152.601402][T16949] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 152.601427][T16949] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 152.633022][T16974] loop3: detected capacity change from 0 to 264192 [ 152.634588][T16975] CPU: 0 PID: 16975 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 152.830756][T16975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.840796][T16975] Call Trace: [ 152.844074][T16975] dump_stack_lvl+0xb7/0x103 [ 152.848653][T16975] dump_stack+0x11/0x1a [ 152.852796][T16975] should_fail+0x23c/0x250 [ 152.857266][T16975] __should_failslab+0x81/0x90 [ 152.862028][T16975] ? alloc_workqueue+0x14c/0xaf0 [ 152.867014][T16975] should_failslab+0x5/0x20 [ 152.871519][T16975] kmem_cache_alloc_trace+0x49/0x310 [ 152.876799][T16975] alloc_workqueue+0x14c/0xaf0 [ 152.881552][T16975] ? mutex_lock_killable+0x9/0x30 [ 152.886588][T16975] ? disk_unblock_events+0x35/0x40 [ 152.891688][T16975] ? bd_prepare_to_claim+0x1e5/0x270 [ 152.896958][T16975] ? loop_attr_do_show_dio+0x70/0x70 [ 152.902306][T16975] ? loop_set_status_from_info+0x35e/0x3a0 [ 152.908103][T16975] loop_configure+0x681/0xeb0 [ 152.912836][T16975] ? terminate_walk+0x263/0x280 [ 152.917718][T16975] lo_ioctl+0x59b/0x1370 [ 152.921956][T16975] ? path_openat+0x18c3/0x1e90 [ 152.926713][T16975] ? putname+0xc6/0xe0 [ 152.930770][T16975] ? ___cache_free+0x3c/0x300 [ 152.935430][T16975] ? blkdev_common_ioctl+0x405/0x10a0 [ 152.940813][T16975] ? selinux_file_ioctl+0x8e0/0x970 [ 152.946024][T16975] ? lo_release+0x120/0x120 [ 152.950529][T16975] blkdev_ioctl+0x1d0/0x3e0 [ 152.955020][T16975] block_ioctl+0x6d/0x80 [ 152.959402][T16975] ? blkdev_iopoll+0x70/0x70 [ 152.963988][T16975] __se_sys_ioctl+0xcb/0x140 [ 152.968841][T16975] __x64_sys_ioctl+0x3f/0x50 [ 152.973432][T16975] do_syscall_64+0x3d/0x90 [ 152.977882][T16975] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.983769][T16975] RIP: 0033:0x4663b7 [ 152.987968][T16975] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.007593][T16975] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.016086][T16975] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 153.024046][T16975] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 153.032010][T16975] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 153.039976][T16975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:53:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 153.047939][T16975] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 153.071811][T16976] loop0: detected capacity change from 0 to 264192 18:53:33 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x1) sendmmsg$sock(r0, &(0x7f0000000500)=[{{&(0x7f0000000100)=@l2={0x1f, 0xdd, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3, 0x1}, 0x80, &(0x7f0000001800)=[{&(0x7f00000001c0)="f2c0a9f33c32bfcdb3b690ca1278a8d9b4797e0b28601bfd68cf570ff7b455df13b8f1e0144df2b323f1b814ff9e085e27c49c02d58ff5ba59295d884dae6e30688ab5a13c10abb6e735e22c86a7134e8e9df9d888db339c8a9c0b207254ece2c9cb17de9914d50a04b3d354e5e0df42999b5b6c20bc73fad8ecd21b6aff7ffff205768125b91ec1a2d601b48853ee7422e8381dfc66d89320f5509ab89b9d59e8c6ff9d2e61154872ffc323d54a6a0010e346372e55aadf648ee1509bc7b3306ddda1fb00b46e16", 0xc8}, {&(0x7f00000002c0)="856f881c3842fb81673cea7ef749def4fcc1a5a06ddfde4b2affd88588d58a39b375bbee5603d925ced1002fb9c352f7b35bd19a842a2207e0e4083ea0b3b5eb3c7ca4da6c2ccfcc6d9e1416f49aa8ce777b1c277479e896c72a9b76367140230f7980736019853a2fe788650b6ee0a858e5d5f13012818d7634786f49b8481a0767bdb9aaa5461ba7373b2c745a3415bc291c0dfc0332e21e348aa344", 0x9d}, {&(0x7f0000000380)="5805f288c3ec36bc540b9e1eebc0b3e1e5fae19ed47b0301decdf6b2553a780294303f9d0319260f7306bc42f55ee0610304c96501385a4a8f2e426643b1016f7be3219a3f7259248a451da5b401be015ec16064c79158a261234d626e0159c83d31306b81602ded2556fc1728f7b2bc3dbd24f39bfa1d4639868aff35b41f95e5bf8ff9730c724dc22c1b33870e68073ae3c0fdb02fc9fd8083d7188046f84ef753625672d15cd1ef8f4969b2fd173e74dbd3b94bcf20", 0xb7}, {&(0x7f0000000440)="03be5193d78b7e20bf7cb2cc65fd79547869bd124c63896d9e948303d3b5cc7d2cc93c9acd531680feefd0d6e1225b54a7010ee4908c4a928786ac6a4e3a57daf609df2beafe2735d1f5c275823d0a7f50880b14ebb4af0c5ad19b7bdd16d0a1fd5242dc79c7e1840240c5991806d66ec3b10c7f97004f439e", 0x79}, {&(0x7f0000000580)="cfc74c83b2722a2b400de7ab1818f49e3132d36a61def0e0bd22e1d0cf03640b8937be9e1a27aa68d512e73fa0a3fe63edc4c21d97473b5bd474333db1305e87d7af12df74bebafef9674591ab981584323b439f5e1d1f2a04b94d815ce9e13a0c0f7b234164a686d18cdc854ec00d9476002bd52db77c0e2849e9be0792c4507358d1a3fd60944c9b9dadfcf70b", 0x8e}, {&(0x7f0000000640)="8850e5f8fa083087d44d24c12d5c91188ffd51da013e474cffd9455bf4985c28a287ccade58d8e9181aee81a8319f3ddc207639347b4c4cfcc08ef6df3b27b36bcd86cf0eaa488f96279445c456faa0c", 0x50}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="e3e35238df5ba3401666c34044e23d375b0453ffdde03c5b9a633c128524e19305b4c59d459b6ba43d5ce1380d40b18309ce4c08c3125e273ee38dc12fe97d565fc46d1ec4bc21cd0e9da84fbcd88f245129103622a88f", 0x57}, {&(0x7f0000001740)="4439d59c9e07c2e8460dff1264ce4e560864a4ea959ac6e875b85ade2e6b515b162c33b478393a0cff0afe5edcb841881b531a7de1f05fcd126dbed7beadc41e885d70108b053e089036dc04d8cc217e391ebfceabcf9f6115a2b2f2756b99084ef30a28be2f3e7979824ee4e324995c1da619249f62f3ddf90c8da5480c3610a7637f3951bd82953aa19475a226d17419a8ae8bb731c9e933211301", 0x9c}], 0x9, &(0x7f00000018c0)=[@timestamping={{0x14, 0x1, 0x25, 0x1000}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0x60}}], 0x1, 0x15) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, &(0x7f0000000540)='pids') r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001980)='./file0/file0\x00', &(0x7f00000019c0), &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], 0x1015, 0x1) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x227c, &(0x7f0000000080)) fcntl$lock(r2, 0x25, &(0x7f0000001940)={0x0, 0x1, 0x4, 0x3}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001a00), 0x1, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000001a80)='./file0\x00', 0x0) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x227c, &(0x7f0000000080)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001a40)='/proc/mdstat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x6) 18:53:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 153.098889][T16976] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 153.118370][T16974] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 153.128831][T16976] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 153.142193][T16976] System zones: 0-2, 18-18, 34-35 [ 153.149897][T16976] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 153.154790][T16974] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 153.161063][T16976] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 153.178525][T16974] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 153.201146][T16974] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 153.232086][T17002] loop5: detected capacity change from 0 to 264192 18:53:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010900, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:33 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000c00906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:33 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x79, &(0x7f00000002c0)="8de208f1679d915745c9f7251cce03ab26a25750cb070000006083f3cf09690f0800000076751e3811ac9d0dd3fd000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x3c) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(r1, 0x0, 0x4, &(0x7f0000000140)) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x3a) 18:53:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010037, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 153.263472][T17002] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 153.287602][T17010] FAULT_INJECTION: forcing a failure. [ 153.287602][T17010] name failslab, interval 1, probability 0, space 0, times 0 [ 153.300237][T17010] CPU: 1 PID: 17010 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 153.303925][T17002] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 153.308641][T17010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.308654][T17010] Call Trace: [ 153.308661][T17010] dump_stack_lvl+0xb7/0x103 [ 153.326150][T17002] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 153.336131][T17010] dump_stack+0x11/0x1a [ 153.336155][T17010] should_fail+0x23c/0x250 [ 153.339443][T17002] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 153.344087][T17010] ? kzalloc+0x16/0x20 [ 153.344133][T17010] __should_failslab+0x81/0x90 [ 153.344151][T17010] should_failslab+0x5/0x20 [ 153.388582][T17010] __kmalloc+0x66/0x340 [ 153.392738][T17010] ? number+0xa03/0xb50 [ 153.396899][T17010] kzalloc+0x16/0x20 [ 153.400786][T17010] apply_wqattrs_prepare+0x3a/0x630 [ 153.405978][T17010] ? vsnprintf+0xe8f/0xed0 [ 153.410380][T17010] apply_workqueue_attrs+0x9e/0x100 [ 153.415611][T17010] alloc_workqueue+0x77d/0xaf0 [ 153.420502][T17010] ? disk_unblock_events+0x35/0x40 [ 153.425616][T17010] ? bd_prepare_to_claim+0x1e5/0x270 [ 153.430903][T17010] ? loop_attr_do_show_dio+0x70/0x70 [ 153.436229][T17010] ? loop_set_status_from_info+0x35e/0x3a0 [ 153.442022][T17010] loop_configure+0x681/0xeb0 [ 153.446689][T17010] ? terminate_walk+0x263/0x280 [ 153.451531][T17010] lo_ioctl+0x59b/0x1370 [ 153.455784][T17010] ? path_openat+0x18c3/0x1e90 [ 153.460576][T17010] ? putname+0xc6/0xe0 [ 153.464637][T17010] ? ___cache_free+0x3c/0x300 [ 153.469332][T17010] ? blkdev_common_ioctl+0x405/0x10a0 [ 153.474693][T17010] ? selinux_file_ioctl+0x8e0/0x970 [ 153.479934][T17010] ? lo_release+0x120/0x120 [ 153.484463][T17010] blkdev_ioctl+0x1d0/0x3e0 [ 153.488949][T17010] block_ioctl+0x6d/0x80 [ 153.493177][T17010] ? blkdev_iopoll+0x70/0x70 [ 153.497751][T17010] __se_sys_ioctl+0xcb/0x140 [ 153.502344][T17010] __x64_sys_ioctl+0x3f/0x50 [ 153.506919][T17010] do_syscall_64+0x3d/0x90 [ 153.511341][T17010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.517279][T17010] RIP: 0033:0x4663b7 [ 153.521219][T17010] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.540816][T17010] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.549253][T17010] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 153.557238][T17010] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:53:34 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 153.565197][T17010] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 153.573247][T17010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 153.581260][T17010] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000f, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 153.637295][T17024] FAULT_INJECTION: forcing a failure. [ 153.637295][T17024] name failslab, interval 1, probability 0, space 0, times 0 [ 153.649954][T17024] CPU: 1 PID: 17024 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 153.658421][T17024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.668506][T17024] Call Trace: [ 153.671783][T17024] dump_stack_lvl+0xb7/0x103 [ 153.676457][T17024] dump_stack+0x11/0x1a [ 153.680614][T17024] should_fail+0x23c/0x250 18:53:34 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 153.685038][T17024] __should_failslab+0x81/0x90 [ 153.689828][T17024] ? apply_wqattrs_prepare+0x5f/0x630 [ 153.695282][T17024] should_failslab+0x5/0x20 [ 153.699874][T17024] kmem_cache_alloc_trace+0x49/0x310 [ 153.705171][T17024] apply_wqattrs_prepare+0x5f/0x630 [ 153.710366][T17024] ? vsnprintf+0xe8f/0xed0 [ 153.714784][T17024] apply_workqueue_attrs+0x9e/0x100 [ 153.720010][T17024] alloc_workqueue+0x77d/0xaf0 [ 153.724785][T17024] ? disk_unblock_events+0x35/0x40 [ 153.729983][T17024] ? bd_prepare_to_claim+0x1e5/0x270 [ 153.735273][T17024] ? loop_attr_do_show_dio+0x70/0x70 [ 153.740643][T17024] ? loop_set_status_from_info+0x35e/0x3a0 [ 153.746453][T17024] loop_configure+0x681/0xeb0 [ 153.751177][T17024] ? terminate_walk+0x263/0x280 [ 153.756027][T17024] lo_ioctl+0x59b/0x1370 [ 153.760277][T17024] ? path_openat+0x18c3/0x1e90 [ 153.765039][T17024] ? putname+0xc6/0xe0 [ 153.769178][T17024] ? ___cache_free+0x3c/0x300 [ 153.773878][T17024] ? blkdev_common_ioctl+0x405/0x10a0 [ 153.779242][T17024] ? selinux_file_ioctl+0x8e0/0x970 [ 153.784432][T17024] ? lo_release+0x120/0x120 [ 153.788921][T17024] blkdev_ioctl+0x1d0/0x3e0 [ 153.793490][T17024] block_ioctl+0x6d/0x80 [ 153.797719][T17024] ? blkdev_iopoll+0x70/0x70 [ 153.802292][T17024] __se_sys_ioctl+0xcb/0x140 [ 153.806922][T17024] __x64_sys_ioctl+0x3f/0x50 [ 153.811529][T17024] do_syscall_64+0x3d/0x90 [ 153.815954][T17024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.821848][T17024] RIP: 0033:0x4663b7 [ 153.825753][T17024] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.847438][T17024] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.855860][T17024] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 153.863818][T17024] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 153.871786][T17024] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 153.879759][T17024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:53:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:34 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 153.887715][T17024] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 153.904805][T17016] loop3: detected capacity change from 0 to 264192 18:53:34 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 153.936248][T17016] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 153.956981][T17016] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 153.974731][T17016] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 153.981895][T17048] loop0: detected capacity change from 0 to 264192 [ 153.986947][T17016] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 154.002039][T17054] FAULT_INJECTION: forcing a failure. [ 154.002039][T17054] name failslab, interval 1, probability 0, space 0, times 0 [ 154.016906][T17054] CPU: 0 PID: 17054 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 154.025333][T17054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.035387][T17054] Call Trace: [ 154.038663][T17054] dump_stack_lvl+0xb7/0x103 [ 154.043256][T17054] dump_stack+0x11/0x1a [ 154.047462][T17054] should_fail+0x23c/0x250 [ 154.051897][T17054] __should_failslab+0x81/0x90 [ 154.056659][T17054] ? apply_wqattrs_prepare+0xbe/0x630 [ 154.062027][T17054] should_failslab+0x5/0x20 [ 154.066519][T17054] kmem_cache_alloc_trace+0x49/0x310 [ 154.071795][T17054] ? apply_wqattrs_prepare+0x5f/0x630 [ 154.077162][T17054] apply_wqattrs_prepare+0xbe/0x630 [ 154.082425][T17054] ? vsnprintf+0xe8f/0xed0 [ 154.086850][T17054] apply_workqueue_attrs+0x9e/0x100 [ 154.092055][T17054] alloc_workqueue+0x77d/0xaf0 [ 154.096824][T17054] ? disk_unblock_events+0x35/0x40 [ 154.101934][T17054] ? bd_prepare_to_claim+0x1e5/0x270 [ 154.107210][T17054] ? loop_attr_do_show_dio+0x70/0x70 [ 154.112496][T17054] ? loop_set_status_from_info+0x35e/0x3a0 [ 154.118294][T17054] loop_configure+0x681/0xeb0 [ 154.122964][T17054] ? terminate_walk+0x263/0x280 [ 154.127889][T17054] lo_ioctl+0x59b/0x1370 [ 154.132147][T17054] ? path_openat+0x18c3/0x1e90 [ 154.136941][T17054] ? putname+0xc6/0xe0 [ 154.141019][T17054] ? ___cache_free+0x3c/0x300 [ 154.145680][T17054] ? blkdev_common_ioctl+0x405/0x10a0 [ 154.151111][T17054] ? selinux_file_ioctl+0x8e0/0x970 [ 154.156299][T17054] ? lo_release+0x120/0x120 [ 154.160810][T17054] blkdev_ioctl+0x1d0/0x3e0 [ 154.165366][T17054] block_ioctl+0x6d/0x80 [ 154.169604][T17054] ? blkdev_iopoll+0x70/0x70 [ 154.174255][T17054] __se_sys_ioctl+0xcb/0x140 [ 154.178849][T17054] __x64_sys_ioctl+0x3f/0x50 [ 154.183424][T17054] do_syscall_64+0x3d/0x90 [ 154.187832][T17054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.193757][T17054] RIP: 0033:0x4663b7 [ 154.197656][T17054] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.217323][T17054] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.225737][T17054] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 154.233695][T17054] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 154.241654][T17054] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 154.249707][T17054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 154.257809][T17054] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 154.266594][T17058] loop5: detected capacity change from 0 to 264192 [ 154.275586][T17048] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 154.292925][T17058] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 154.302955][T17048] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 154.332473][T17058] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 154.350098][T17058] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 154.356832][T17048] System zones: 0-2 [ 154.362332][T17058] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 154.366180][T17048] , 18-18, 34-35 18:53:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010a00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:34 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010038, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:34 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010010, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 154.412868][T17048] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 154.483524][T17090] FAULT_INJECTION: forcing a failure. [ 154.483524][T17090] name failslab, interval 1, probability 0, space 0, times 0 [ 154.496221][T17090] CPU: 1 PID: 17090 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 154.504635][T17090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.514774][T17090] Call Trace: [ 154.518122][T17090] dump_stack_lvl+0xb7/0x103 [ 154.522712][T17090] dump_stack+0x11/0x1a [ 154.526866][T17090] should_fail+0x23c/0x250 [ 154.531287][T17090] __should_failslab+0x81/0x90 [ 154.536059][T17090] should_failslab+0x5/0x20 [ 154.540638][T17090] kmem_cache_alloc_node+0x58/0x2b0 [ 154.545843][T17090] ? alloc_unbound_pwq+0x3e6/0x780 [ 154.550939][T17090] alloc_unbound_pwq+0x3e6/0x780 [ 154.555860][T17090] apply_wqattrs_prepare+0x1ed/0x630 [ 154.561131][T17090] ? vsnprintf+0xe8f/0xed0 [ 154.565542][T17090] apply_workqueue_attrs+0x9e/0x100 [ 154.570792][T17090] alloc_workqueue+0x77d/0xaf0 [ 154.575655][T17090] ? disk_unblock_events+0x35/0x40 [ 154.580760][T17090] ? bd_prepare_to_claim+0x1e5/0x270 [ 154.586057][T17090] ? loop_attr_do_show_dio+0x70/0x70 [ 154.591335][T17090] ? loop_set_status_from_info+0x35e/0x3a0 [ 154.597151][T17090] loop_configure+0x681/0xeb0 [ 154.601820][T17090] ? terminate_walk+0x263/0x280 [ 154.606656][T17090] lo_ioctl+0x59b/0x1370 [ 154.610907][T17090] ? path_openat+0x18c3/0x1e90 [ 154.615664][T17090] ? putname+0xc6/0xe0 [ 154.619722][T17090] ? ___cache_free+0x3c/0x300 [ 154.624384][T17090] ? blkdev_common_ioctl+0x405/0x10a0 [ 154.629780][T17090] ? selinux_file_ioctl+0x8e0/0x970 [ 154.635019][T17090] ? lo_release+0x120/0x120 [ 154.639511][T17090] blkdev_ioctl+0x1d0/0x3e0 [ 154.643999][T17090] block_ioctl+0x6d/0x80 [ 154.648413][T17090] ? blkdev_iopoll+0x70/0x70 [ 154.652993][T17090] __se_sys_ioctl+0xcb/0x140 [ 154.657570][T17090] __x64_sys_ioctl+0x3f/0x50 [ 154.662157][T17090] do_syscall_64+0x3d/0x90 [ 154.671775][T17090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.678578][T17090] RIP: 0033:0x4663b7 [ 154.683301][T17090] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.704721][T17090] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.713295][T17090] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 154.721351][T17090] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 154.729393][T17090] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 154.737347][T17090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 154.745475][T17090] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 154.757138][T17092] loop3: detected capacity change from 0 to 264192 [ 154.773953][T17102] loop0: detected capacity change from 0 to 264192 [ 154.780598][T17101] loop5: detected capacity change from 0 to 264192 [ 154.800587][T17102] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 154.819471][T17101] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 154.835758][T17102] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:35 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 154.870442][T17101] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 154.875054][T17102] System zones: 0-2, 18-18, 34-35 [ 154.888013][T17101] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 154.910041][T17092] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 154.916216][T17102] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010011, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010a12, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 154.947171][T17092] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 154.964794][T17092] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010039, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:35 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) gettid() 18:53:35 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000052f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 155.047283][T17142] loop5: detected capacity change from 0 to 264192 [ 155.104577][T17155] FAULT_INJECTION: forcing a failure. [ 155.104577][T17155] name failslab, interval 1, probability 0, space 0, times 0 [ 155.117258][T17155] CPU: 0 PID: 17155 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 155.117895][T17158] loop3: detected capacity change from 0 to 264192 [ 155.125742][T17155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.125755][T17155] Call Trace: [ 155.125762][T17155] dump_stack_lvl+0xb7/0x103 [ 155.150189][T17155] dump_stack+0x11/0x1a [ 155.154424][T17155] should_fail+0x23c/0x250 [ 155.158845][T17155] __should_failslab+0x81/0x90 [ 155.163600][T17155] ? kobject_uevent_env+0x1a7/0xc40 [ 155.168803][T17155] should_failslab+0x5/0x20 [ 155.173577][T17155] kmem_cache_alloc_trace+0x49/0x310 [ 155.178876][T17155] ? dev_uevent_filter+0x70/0x70 [ 155.184101][T17155] kobject_uevent_env+0x1a7/0xc40 [ 155.189389][T17155] ? disk_unblock_events+0x35/0x40 [ 155.194487][T17155] disk_force_media_change+0xe3/0x170 [ 155.199848][T17155] loop_configure+0x6c0/0xeb0 [ 155.204610][T17155] ? terminate_walk+0x263/0x280 [ 155.209469][T17155] lo_ioctl+0x59b/0x1370 [ 155.213699][T17155] ? path_openat+0x18c3/0x1e90 [ 155.218455][T17155] ? putname+0xc6/0xe0 [ 155.222513][T17155] ? ___cache_free+0x3c/0x300 [ 155.227182][T17155] ? blkdev_common_ioctl+0x405/0x10a0 [ 155.232538][T17155] ? selinux_file_ioctl+0x8e0/0x970 [ 155.237727][T17155] ? lo_release+0x120/0x120 [ 155.242229][T17155] blkdev_ioctl+0x1d0/0x3e0 [ 155.246720][T17155] block_ioctl+0x6d/0x80 [ 155.250948][T17155] ? blkdev_iopoll+0x70/0x70 [ 155.255555][T17155] __se_sys_ioctl+0xcb/0x140 [ 155.260131][T17155] __x64_sys_ioctl+0x3f/0x50 [ 155.264712][T17155] do_syscall_64+0x3d/0x90 [ 155.269153][T17155] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.275183][T17155] RIP: 0033:0x4663b7 [ 155.279060][T17155] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.298670][T17155] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 155.307243][T17155] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 155.315198][T17155] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 155.323152][T17155] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 155.331110][T17155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 155.339067][T17155] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 155.360445][T17155] loop1: detected capacity change from 0 to 264192 [ 155.369451][T17157] loop0: detected capacity change from 0 to 264192 [ 155.395492][T17157] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 155.405268][T17142] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 155.411038][T17157] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 155.424207][T17158] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 155.427818][T17157] System zones: 0-2, 18-18, 34-35 [ 155.463634][T17155] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 155.475171][T17142] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 155.475485][T17157] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 155.492939][T17142] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 155.508411][T17158] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 155.521655][T17155] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 155.533747][T17158] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 155.541880][T17155] System zones: 0-2, 18-18, 34-35 18:53:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010012, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:36 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010b00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000048006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 155.560551][T17155] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800009c006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 155.662529][T17207] loop5: detected capacity change from 0 to 264192 [ 155.665858][T17210] loop0: detected capacity change from 0 to 264192 [ 155.678038][T17212] loop3: detected capacity change from 0 to 264192 [ 155.680766][T17211] FAULT_INJECTION: forcing a failure. [ 155.680766][T17211] name failslab, interval 1, probability 0, space 0, times 0 [ 155.697225][T17211] CPU: 1 PID: 17211 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 155.705641][T17211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.715693][T17211] Call Trace: [ 155.718964][T17211] dump_stack_lvl+0xb7/0x103 [ 155.723557][T17211] dump_stack+0x11/0x1a [ 155.727711][T17211] should_fail+0x23c/0x250 [ 155.732271][T17211] ? kzalloc+0x1d/0x30 [ 155.736694][T17211] __should_failslab+0x81/0x90 [ 155.739463][T17212] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 155.741479][T17211] should_failslab+0x5/0x20 [ 155.751634][T17210] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 155.755086][T17211] __kmalloc+0x66/0x340 [ 155.755109][T17211] kzalloc+0x1d/0x30 [ 155.755129][T17211] kobject_get_path+0x7c/0x110 [ 155.755151][T17211] kobject_uevent_env+0x1be/0xc40 [ 155.767650][T17212] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 155.768358][T17211] ? disk_unblock_events+0x35/0x40 [ 155.768386][T17211] disk_force_media_change+0xe3/0x170 [ 155.772306][T17212] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 155.777028][T17211] loop_configure+0x6c0/0xeb0 [ 155.777052][T17211] ? terminate_walk+0x263/0x280 [ 155.785007][T17210] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 155.800922][T17211] lo_ioctl+0x59b/0x1370 [ 155.800951][T17211] ? path_openat+0x18c3/0x1e90 [ 155.806983][T17210] System zones: [ 155.811666][T17211] ? putname+0xc6/0xe0 [ 155.823767][T17210] 0-2 18:53:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 155.828648][T17211] ? ___cache_free+0x3c/0x300 [ 155.833580][T17210] , 18-18 [ 155.841957][T17211] ? blkdev_common_ioctl+0x405/0x10a0 [ 155.846624][T17210] , 34-35 [ 155.851345][T17211] ? selinux_file_ioctl+0x8e0/0x970 [ 155.854897][T17210] [ 155.858923][T17211] ? lo_release+0x120/0x120 [ 155.879199][T17210] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 155.882528][T17211] blkdev_ioctl+0x1d0/0x3e0 [ 155.882551][T17211] block_ioctl+0x6d/0x80 [ 155.882568][T17211] ? blkdev_iopoll+0x70/0x70 [ 155.882584][T17211] __se_sys_ioctl+0xcb/0x140 [ 155.885516][T17207] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 155.889434][T17211] __x64_sys_ioctl+0x3f/0x50 [ 155.889458][T17211] do_syscall_64+0x3d/0x90 [ 155.917208][T17207] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 155.918286][T17211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.927519][T17207] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 155.932047][T17211] RIP: 0033:0x4663b7 [ 155.975840][T17211] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.995699][T17211] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 156.004111][T17211] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 156.012083][T17211] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 156.020045][T17211] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 156.027999][T17211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 156.035955][T17211] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 156.045644][T17211] loop1: detected capacity change from 0 to 264192 [ 156.075673][T17211] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 156.090486][T17211] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 156.109626][T17211] System zones: 0-2, 18-18, 34-35 [ 156.120525][T17211] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 156.125239][T17246] loop3: detected capacity change from 0 to 264192 [ 156.172331][T17246] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 156.184081][T17246] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 156.201606][T17246] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010b12, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000fffe06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010018, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:38 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) gettid() 18:53:38 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 158.096533][T17262] FAULT_INJECTION: forcing a failure. [ 158.096533][T17262] name failslab, interval 1, probability 0, space 0, times 0 [ 158.109295][T17262] CPU: 1 PID: 17262 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 158.117761][T17262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.127808][T17262] Call Trace: [ 158.131074][T17262] dump_stack_lvl+0xb7/0x103 [ 158.135653][T17262] dump_stack+0x11/0x1a [ 158.139877][T17262] should_fail+0x23c/0x250 [ 158.144285][T17262] __should_failslab+0x81/0x90 [ 158.149038][T17262] should_failslab+0x5/0x20 [ 158.153529][T17262] kmem_cache_alloc_node+0x58/0x2b0 [ 158.158799][T17262] ? __alloc_skb+0xed/0x420 [ 158.163295][T17262] __alloc_skb+0xed/0x420 [ 158.167612][T17262] alloc_uevent_skb+0x5b/0x120 [ 158.172372][T17262] kobject_uevent_env+0x863/0xc40 [ 158.177454][T17262] ? disk_unblock_events+0x35/0x40 [ 158.182575][T17262] disk_force_media_change+0xe3/0x170 [ 158.187988][T17262] loop_configure+0x6c0/0xeb0 [ 158.192659][T17262] ? terminate_walk+0x263/0x280 [ 158.197499][T17262] lo_ioctl+0x59b/0x1370 [ 158.201743][T17262] ? path_openat+0x18c3/0x1e90 [ 158.206571][T17262] ? putname+0xc6/0xe0 [ 158.210714][T17262] ? ___cache_free+0x3c/0x300 [ 158.215420][T17262] ? blkdev_common_ioctl+0x405/0x10a0 [ 158.220789][T17262] ? selinux_file_ioctl+0x8e0/0x970 [ 158.226038][T17262] ? lo_release+0x120/0x120 [ 158.230530][T17262] blkdev_ioctl+0x1d0/0x3e0 [ 158.235056][T17262] block_ioctl+0x6d/0x80 [ 158.239354][T17262] ? blkdev_iopoll+0x70/0x70 [ 158.243929][T17262] __se_sys_ioctl+0xcb/0x140 [ 158.248502][T17262] __x64_sys_ioctl+0x3f/0x50 [ 158.253079][T17262] do_syscall_64+0x3d/0x90 [ 158.257487][T17262] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 158.263405][T17262] RIP: 0033:0x4663b7 [ 158.267283][T17262] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 158.286955][T17262] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.295356][T17262] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 158.303347][T17262] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 158.311300][T17262] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 158.319256][T17262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 158.327226][T17262] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000feff06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 158.343408][T17266] loop5: detected capacity change from 0 to 264192 [ 158.344295][T17263] loop0: detected capacity change from 0 to 264192 [ 158.352037][T17269] loop3: detected capacity change from 0 to 264192 [ 158.367917][T17262] loop1: detected capacity change from 0 to 264192 [ 158.374808][T17269] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 158.385604][T17266] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 158.405595][T17263] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 158.420409][T17269] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 158.420668][T17266] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 158.438096][T17269] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 158.455533][T17266] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 158.469515][T17262] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 158.487725][T17263] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 158.498137][T17263] System zones: 0-2, 18-18, 34-35 [ 158.503638][T17263] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000005000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010019, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:39 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 158.551736][T17262] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 158.574057][T17262] System zones: 0-2, 18-18, 34-35 [ 158.579651][T17262] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 158.675290][T17323] loop5: detected capacity change from 0 to 264192 [ 158.677422][T17325] loop0: detected capacity change from 0 to 264192 [ 158.688539][T17329] FAULT_INJECTION: forcing a failure. [ 158.688539][T17329] name failslab, interval 1, probability 0, space 0, times 0 [ 158.701268][T17329] CPU: 0 PID: 17329 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 158.709759][T17329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.719807][T17329] Call Trace: [ 158.723074][T17329] dump_stack_lvl+0xb7/0x103 [ 158.727647][T17329] dump_stack+0x11/0x1a [ 158.731787][T17329] should_fail+0x23c/0x250 [ 158.736186][T17329] __should_failslab+0x81/0x90 [ 158.741016][T17329] should_failslab+0x5/0x20 [ 158.745512][T17329] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 158.751225][T17329] ? __kmalloc_node_track_caller+0x30/0x40 [ 158.757060][T17329] ? kmem_cache_alloc_node+0x1d4/0x2b0 [ 158.762498][T17329] __kmalloc_node_track_caller+0x30/0x40 [ 158.768157][T17329] ? alloc_uevent_skb+0x5b/0x120 [ 158.773273][T17329] __alloc_skb+0x187/0x420 [ 158.777740][T17329] alloc_uevent_skb+0x5b/0x120 [ 158.782508][T17329] kobject_uevent_env+0x863/0xc40 [ 158.787516][T17329] ? disk_unblock_events+0x35/0x40 [ 158.792618][T17329] disk_force_media_change+0xe3/0x170 [ 158.798213][T17329] loop_configure+0x6c0/0xeb0 [ 158.803019][T17329] ? terminate_walk+0x263/0x280 [ 158.807855][T17329] lo_ioctl+0x59b/0x1370 [ 158.812164][T17329] ? path_openat+0x18c3/0x1e90 [ 158.816945][T17329] ? putname+0xc6/0xe0 [ 158.821000][T17329] ? ___cache_free+0x3c/0x300 [ 158.825671][T17329] ? blkdev_common_ioctl+0x405/0x10a0 [ 158.831026][T17329] ? selinux_file_ioctl+0x8e0/0x970 [ 158.836257][T17329] ? lo_release+0x120/0x120 [ 158.840752][T17329] blkdev_ioctl+0x1d0/0x3e0 [ 158.845338][T17329] block_ioctl+0x6d/0x80 [ 158.849651][T17329] ? blkdev_iopoll+0x70/0x70 [ 158.854480][T17329] __se_sys_ioctl+0xcb/0x140 [ 158.859060][T17329] __x64_sys_ioctl+0x3f/0x50 [ 158.863855][T17329] do_syscall_64+0x3d/0x90 [ 158.868259][T17329] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 158.874160][T17329] RIP: 0033:0x4663b7 [ 158.878047][T17329] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 158.898252][T17329] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.906654][T17329] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 158.914660][T17329] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 158.922621][T17329] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 158.930577][T17329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 158.938613][T17329] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 158.946884][T17329] loop1: detected capacity change from 0 to 264192 [ 158.956501][T17329] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 158.959277][T17330] loop3: detected capacity change from 0 to 264192 [ 158.981522][T17323] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 158.991530][T17325] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 158.991716][T17329] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 159.001917][T17330] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 159.008777][T17323] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 159.024992][T17325] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 159.035512][T17323] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 159.048480][T17330] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 159.073093][T17330] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 159.104286][T17329] System zones: 0-2, 18-18, 34-35 [ 159.119072][T17325] System zones: 0-2, 18-18, 34-35 [ 159.125268][T17329] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 159.164076][T17325] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:41 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) gettid() 18:53:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01001b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:41 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010c12, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 161.134568][T17368] FAULT_INJECTION: forcing a failure. [ 161.134568][T17368] name failslab, interval 1, probability 0, space 0, times 0 [ 161.147245][T17368] CPU: 0 PID: 17368 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 161.155711][T17368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.165832][T17368] Call Trace: [ 161.169114][T17368] dump_stack_lvl+0xb7/0x103 [ 161.173824][T17368] dump_stack+0x11/0x1a [ 161.177977][T17368] should_fail+0x23c/0x250 [ 161.182397][T17368] ? skb_clone+0x12c/0x1f0 [ 161.186807][T17368] __should_failslab+0x81/0x90 [ 161.191767][T17368] should_failslab+0x5/0x20 [ 161.196336][T17368] kmem_cache_alloc+0x46/0x2e0 [ 161.201172][T17368] skb_clone+0x12c/0x1f0 [ 161.205466][T17368] netlink_broadcast_filtered+0x4fd/0xb60 [ 161.211180][T17368] ? skb_put+0xb9/0xf0 [ 161.215309][T17368] netlink_broadcast+0x35/0x50 [ 161.220057][T17368] kobject_uevent_env+0x8c9/0xc40 [ 161.225071][T17368] ? disk_unblock_events+0x35/0x40 [ 161.230255][T17368] disk_force_media_change+0xe3/0x170 [ 161.235674][T17368] loop_configure+0x6c0/0xeb0 [ 161.240340][T17368] ? terminate_walk+0x263/0x280 [ 161.245215][T17368] lo_ioctl+0x59b/0x1370 [ 161.249453][T17368] ? path_openat+0x18c3/0x1e90 [ 161.254209][T17368] ? putname+0xc6/0xe0 [ 161.258284][T17368] ? ___cache_free+0x3c/0x300 [ 161.262955][T17368] ? blkdev_common_ioctl+0x405/0x10a0 [ 161.268492][T17368] ? selinux_file_ioctl+0x8e0/0x970 [ 161.273678][T17368] ? lo_release+0x120/0x120 [ 161.278239][T17368] blkdev_ioctl+0x1d0/0x3e0 [ 161.282721][T17368] block_ioctl+0x6d/0x80 [ 161.286967][T17368] ? blkdev_iopoll+0x70/0x70 [ 161.291570][T17368] __se_sys_ioctl+0xcb/0x140 [ 161.296156][T17368] __x64_sys_ioctl+0x3f/0x50 [ 161.300732][T17368] do_syscall_64+0x3d/0x90 [ 161.305283][T17368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.311269][T17368] RIP: 0033:0x4663b7 [ 161.315157][T17368] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.335093][T17368] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.343616][T17368] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 161.351582][T17368] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 161.359545][T17368] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 161.367681][T17368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 161.375681][T17368] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 161.384510][T17372] loop5: detected capacity change from 0 to 264192 [ 161.394684][T17370] loop0: detected capacity change from 0 to 264192 [ 161.401511][T17368] loop1: detected capacity change from 0 to 264192 [ 161.416557][T17373] loop3: detected capacity change from 0 to 264192 [ 161.428895][T17372] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 161.444971][T17373] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 161.462327][T17368] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 161.473672][T17372] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 161.491201][T17372] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 161.504723][T17373] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 161.504927][T17368] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010022, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 161.522519][T17373] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 161.531769][T17368] System zones: 0-2, 18-18, 34-35 18:53:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010046, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:42 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 161.577204][T17370] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 161.588736][T17370] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 161.597600][T17370] System zones: 0-2, 18-18, 34-35 [ 161.603513][T17368] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 161.603716][T17370] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010d00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 161.684779][T17416] loop3: detected capacity change from 0 to 264192 [ 161.691756][T17419] loop5: detected capacity change from 0 to 264192 [ 161.706319][T17423] FAULT_INJECTION: forcing a failure. [ 161.706319][T17423] name failslab, interval 1, probability 0, space 0, times 0 [ 161.719007][T17423] CPU: 0 PID: 17423 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 161.727512][T17423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.737658][T17423] Call Trace: [ 161.740951][T17423] dump_stack_lvl+0xb7/0x103 [ 161.745634][T17423] dump_stack+0x11/0x1a [ 161.749788][T17423] should_fail+0x23c/0x250 [ 161.754285][T17423] __should_failslab+0x81/0x90 [ 161.759047][T17423] ? call_usermodehelper_setup+0x71/0x190 [ 161.764767][T17423] should_failslab+0x5/0x20 [ 161.765344][T17434] loop0: detected capacity change from 0 to 264192 [ 161.769306][T17423] kmem_cache_alloc_trace+0x49/0x310 [ 161.769331][T17423] call_usermodehelper_setup+0x71/0x190 [ 161.779043][T17419] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 161.781160][T17423] ? add_uevent_var+0x1c0/0x1c0 [ 161.787435][T17416] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 161.795893][T17423] kobject_uevent_env+0xb29/0xc40 [ 161.795924][T17423] ? disk_unblock_events+0x35/0x40 [ 161.795946][T17423] disk_force_media_change+0xe3/0x170 [ 161.801835][T17419] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 161.809962][T17423] loop_configure+0x6c0/0xeb0 [ 161.809993][T17423] ? terminate_walk+0x263/0x280 [ 161.810010][T17423] lo_ioctl+0x59b/0x1370 [ 161.815055][T17419] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 161.820252][T17423] ? path_openat+0x18c3/0x1e90 [ 161.828402][T17416] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 161.843027][T17423] ? putname+0xc6/0xe0 [ 161.843055][T17423] ? ___cache_free+0x3c/0x300 [ 161.843071][T17423] ? blkdev_common_ioctl+0x405/0x10a0 [ 161.843089][T17423] ? selinux_file_ioctl+0x8e0/0x970 [ 161.847951][T17416] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 161.852735][T17423] ? lo_release+0x120/0x120 [ 161.865375][T17434] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 161.869156][T17423] blkdev_ioctl+0x1d0/0x3e0 [ 161.869181][T17423] block_ioctl+0x6d/0x80 [ 161.874209][T17434] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 161.891374][T17423] ? blkdev_iopoll+0x70/0x70 [ 161.891400][T17423] __se_sys_ioctl+0xcb/0x140 [ 161.891419][T17423] __x64_sys_ioctl+0x3f/0x50 [ 161.897162][T17434] System zones: [ 161.900167][T17423] do_syscall_64+0x3d/0x90 [ 161.905579][T17434] 0-2 [ 161.910715][T17423] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.922856][T17434] , 18-18 [ 161.927309][T17423] RIP: 0033:0x4663b7 [ 161.927325][T17423] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.936411][T17434] , 34-35 [ 161.940871][T17423] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 [ 161.945099][T17434] [ 161.953234][T17423] ORIG_RAX: 0000000000000010 [ 161.953253][T17423] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 161.953266][T17423] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 161.961003][T17434] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 161.962537][T17423] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 161.962553][T17423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 161.962565][T17423] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 162.077829][T17423] loop1: detected capacity change from 0 to 264192 [ 162.091038][T17423] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 162.100741][T17423] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 162.108768][T17423] System zones: 0-2, 18-18, 34-35 [ 162.117085][T17423] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:44 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) tkill(0x0, 0x34) 18:53:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010047, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010025, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010d12, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:44 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 164.173306][T17466] loop3: detected capacity change from 0 to 264192 [ 164.196469][T17466] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 164.202947][T17474] FAULT_INJECTION: forcing a failure. [ 164.202947][T17474] name failslab, interval 1, probability 0, space 0, times 0 [ 164.214399][T17472] loop0: detected capacity change from 0 to 264192 [ 164.218402][T17474] CPU: 1 PID: 17474 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 164.229116][T17481] loop5: detected capacity change from 0 to 264192 [ 164.233272][T17474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.233287][T17474] Call Trace: [ 164.233295][T17474] dump_stack_lvl+0xb7/0x103 [ 164.233319][T17474] dump_stack+0x11/0x1a [ 164.261925][T17474] should_fail+0x23c/0x250 [ 164.266659][T17474] ? __kernfs_new_node+0x6a/0x330 18:53:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 164.271813][T17474] __should_failslab+0x81/0x90 [ 164.277136][T17474] should_failslab+0x5/0x20 [ 164.281800][T17474] kmem_cache_alloc+0x46/0x2e0 [ 164.286582][T17474] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 164.292548][T17474] __kernfs_new_node+0x6a/0x330 [ 164.297536][T17474] ? ___cache_free+0x3c/0x300 [ 164.302219][T17474] ? sysvec_apic_timer_interrupt+0x3e/0x80 [ 164.308099][T17474] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 164.314260][T17474] kernfs_create_dir_ns+0x5e/0x140 [ 164.319370][T17474] internal_create_group+0x138/0x850 [ 164.324672][T17474] ? __invalidate_device+0xb0/0xc0 [ 164.329781][T17474] ? set_disk_ro+0x73/0x110 [ 164.334302][T17474] sysfs_create_group+0x1b/0x20 [ 164.339157][T17474] loop_configure+0xbcd/0xeb0 [ 164.343842][T17474] lo_ioctl+0x59b/0x1370 [ 164.348094][T17474] ? path_openat+0x18c3/0x1e90 [ 164.352928][T17474] ? putname+0xc6/0xe0 [ 164.357004][T17474] ? ___cache_free+0x3c/0x300 [ 164.361692][T17474] ? blkdev_common_ioctl+0x405/0x10a0 [ 164.367069][T17474] ? selinux_file_ioctl+0x8e0/0x970 18:53:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 164.372609][T17474] ? lo_release+0x120/0x120 [ 164.377216][T17474] blkdev_ioctl+0x1d0/0x3e0 [ 164.382065][T17474] block_ioctl+0x6d/0x80 [ 164.386302][T17474] ? blkdev_iopoll+0x70/0x70 [ 164.390882][T17474] __se_sys_ioctl+0xcb/0x140 [ 164.395472][T17474] __x64_sys_ioctl+0x3f/0x50 [ 164.400071][T17474] do_syscall_64+0x3d/0x90 [ 164.404500][T17474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.410844][T17474] RIP: 0033:0x4663b7 18:53:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 164.414763][T17474] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.434740][T17474] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.438289][T17481] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 164.443171][T17474] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 164.443188][T17474] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 164.443201][T17474] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 164.443213][T17474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 164.458838][T17466] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 164.466348][T17474] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 164.466403][T17474] loop1: detected capacity change from 0 to 264192 [ 164.480131][T17472] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 164.482483][T17466] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 164.535159][T17481] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 164.546475][T17472] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010048, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 164.563233][T17481] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 164.565684][T17474] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 164.583597][T17472] System zones: 0-2, 18-18, 34-35 [ 164.611427][T17474] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01002e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 164.622895][T17472] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 164.646233][T17474] System zones: 0-2, 18-18, 34-35 [ 164.651784][T17474] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 164.707559][T17528] loop3: detected capacity change from 0 to 264192 [ 164.736473][T17537] loop5: detected capacity change from 0 to 264192 [ 164.743548][T17528] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 164.755410][T17528] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 164.773286][T17528] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 164.802411][T17537] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 164.812957][T17537] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 164.830513][T17537] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:47 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) tkill(0x0, 0x34) 18:53:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010e00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:47 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01004c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010035, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 167.201648][T17560] loop0: detected capacity change from 0 to 264192 [ 167.220830][T17561] loop5: detected capacity change from 0 to 264192 [ 167.233775][T17560] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 167.235806][T17574] loop3: detected capacity change from 0 to 264192 [ 167.251768][T17572] FAULT_INJECTION: forcing a failure. [ 167.251768][T17572] name failslab, interval 1, probability 0, space 0, times 0 [ 167.264420][T17572] CPU: 0 PID: 17572 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 167.272839][T17572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.282978][T17572] Call Trace: [ 167.286252][T17572] dump_stack_lvl+0xb7/0x103 [ 167.290834][T17572] dump_stack+0x11/0x1a [ 167.294978][T17572] should_fail+0x23c/0x250 [ 167.299419][T17572] ? __kernfs_new_node+0x6a/0x330 [ 167.304705][T17572] __should_failslab+0x81/0x90 [ 167.309512][T17572] should_failslab+0x5/0x20 [ 167.314002][T17572] kmem_cache_alloc+0x46/0x2e0 [ 167.318840][T17572] ? __cond_resched+0x11/0x40 [ 167.323509][T17572] __kernfs_new_node+0x6a/0x330 [ 167.328355][T17572] ? __down_write_common+0x42/0x810 [ 167.333545][T17572] ? idr_alloc_cyclic+0x249/0x2d0 [ 167.338555][T17572] ? __down_write_common+0x42/0x810 [ 167.343785][T17572] ? rb_insert_color+0x7e/0x310 [ 167.348662][T17572] kernfs_new_node+0x5b/0xd0 [ 167.353255][T17572] __kernfs_create_file+0x45/0x1a0 [ 167.358432][T17572] sysfs_add_file_mode_ns+0x1c1/0x250 [ 167.363803][T17572] internal_create_group+0x2e4/0x850 [ 167.369098][T17572] ? set_disk_ro+0x73/0x110 [ 167.373622][T17572] sysfs_create_group+0x1b/0x20 [ 167.378466][T17572] loop_configure+0xbcd/0xeb0 [ 167.383131][T17572] lo_ioctl+0x59b/0x1370 [ 167.387362][T17572] ? path_openat+0x18c3/0x1e90 [ 167.392142][T17572] ? putname+0xc6/0xe0 [ 167.396216][T17572] ? ___cache_free+0x3c/0x300 [ 167.400882][T17572] ? blkdev_common_ioctl+0x405/0x10a0 [ 167.406259][T17572] ? selinux_file_ioctl+0x8e0/0x970 [ 167.411464][T17572] ? lo_release+0x120/0x120 [ 167.416004][T17572] blkdev_ioctl+0x1d0/0x3e0 [ 167.420763][T17572] block_ioctl+0x6d/0x80 [ 167.425010][T17572] ? blkdev_iopoll+0x70/0x70 [ 167.429595][T17572] __se_sys_ioctl+0xcb/0x140 [ 167.434361][T17572] __x64_sys_ioctl+0x3f/0x50 [ 167.438944][T17572] do_syscall_64+0x3d/0x90 [ 167.443374][T17572] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.449519][T17572] RIP: 0033:0x4663b7 [ 167.453401][T17572] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.472998][T17572] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.481400][T17572] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 167.489358][T17572] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 167.497313][T17572] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 167.505271][T17572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 167.513487][T17572] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 167.529512][T17572] loop1: detected capacity change from 0 to 264192 [ 167.539750][T17574] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 167.554626][T17560] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 167.564380][T17560] System zones: 0-2, 18-18, 34-35 [ 167.570420][T17560] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 167.575191][T17574] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000fe06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010e12, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 167.599197][T17574] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 167.614479][T17572] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 167.630962][T17572] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 167.647897][T17572] System zones: 0-2, 18-18, 34-35 18:53:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010060, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 167.667861][T17561] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 167.682073][T17572] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 167.688107][T17561] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:48 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000005f000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 167.710811][T17561] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 167.735031][T17603] loop0: detected capacity change from 0 to 264192 [ 167.794306][T17623] FAULT_INJECTION: forcing a failure. [ 167.794306][T17623] name failslab, interval 1, probability 0, space 0, times 0 [ 167.797389][T17603] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 167.806951][T17623] CPU: 0 PID: 17623 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 167.824485][T17623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.834535][T17623] Call Trace: [ 167.837872][T17623] dump_stack_lvl+0xb7/0x103 [ 167.842470][T17623] dump_stack+0x11/0x1a [ 167.846633][T17623] should_fail+0x23c/0x250 [ 167.850488][T17603] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 167.851063][T17623] ? __kernfs_new_node+0x6a/0x330 [ 167.859119][T17603] System zones: [ 167.864050][T17623] __should_failslab+0x81/0x90 [ 167.864076][T17623] should_failslab+0x5/0x20 [ 167.867617][T17603] 0-2 [ 167.872357][T17623] kmem_cache_alloc+0x46/0x2e0 [ 167.876902][T17603] , 18-18 [ 167.879405][T17623] ? __down_write_common+0x42/0x810 [ 167.884245][T17603] , 34-35 [ 167.887141][T17623] __kernfs_new_node+0x6a/0x330 [ 167.892313][T17603] [ 167.898273][T17603] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 167.900053][T17623] ? up_write+0x25/0xc0 [ 167.917592][T17623] kernfs_new_node+0x5b/0xd0 [ 167.922237][T17623] __kernfs_create_file+0x45/0x1a0 [ 167.927520][T17623] sysfs_add_file_mode_ns+0x1c1/0x250 [ 167.932988][T17623] internal_create_group+0x2e4/0x850 [ 167.938297][T17623] ? set_disk_ro+0x73/0x110 [ 167.942844][T17623] sysfs_create_group+0x1b/0x20 [ 167.946061][T17625] loop3: detected capacity change from 0 to 264192 [ 167.947710][T17623] loop_configure+0xbcd/0xeb0 [ 167.958898][T17623] lo_ioctl+0x59b/0x1370 [ 167.963166][T17623] ? path_openat+0x18c3/0x1e90 [ 167.968006][T17623] ? putname+0xc6/0xe0 [ 167.972161][T17623] ? ___cache_free+0x3c/0x300 [ 167.976834][T17623] ? blkdev_common_ioctl+0x405/0x10a0 [ 167.982215][T17623] ? selinux_file_ioctl+0x8e0/0x970 [ 167.987524][T17623] ? lo_release+0x120/0x120 [ 167.992988][T17623] blkdev_ioctl+0x1d0/0x3e0 [ 167.997522][T17623] block_ioctl+0x6d/0x80 [ 168.001768][T17623] ? blkdev_iopoll+0x70/0x70 [ 168.006346][T17623] __se_sys_ioctl+0xcb/0x140 [ 168.010929][T17623] __x64_sys_ioctl+0x3f/0x50 [ 168.015603][T17623] do_syscall_64+0x3d/0x90 [ 168.020013][T17623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.026086][T17623] RIP: 0033:0x4663b7 [ 168.029967][T17623] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.049559][T17623] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 168.058129][T17623] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 168.066189][T17623] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 168.074168][T17623] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 168.082396][T17623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 168.090370][T17623] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 168.107091][T17625] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 168.116049][T17623] loop1: detected capacity change from 0 to 264192 [ 168.118265][T17625] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 168.140725][T17625] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 168.158187][T17623] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 168.187612][T17623] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 168.196107][T17623] System zones: 0-2, 18-18, 34-35 [ 168.201466][T17623] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000002000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010037, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:50 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) tkill(0x0, 0x34) 18:53:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:50 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010068, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 170.251648][T17658] FAULT_INJECTION: forcing a failure. [ 170.251648][T17658] name failslab, interval 1, probability 0, space 0, times 0 [ 170.264400][T17658] CPU: 1 PID: 17658 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 170.272565][T17665] loop3: detected capacity change from 0 to 264192 [ 170.273069][T17658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.273081][T17658] Call Trace: [ 170.293713][T17658] dump_stack_lvl+0xb7/0x103 [ 170.298350][T17658] dump_stack+0x11/0x1a [ 170.302613][T17658] should_fail+0x23c/0x250 [ 170.307038][T17658] ? __kernfs_new_node+0x6a/0x330 [ 170.312151][T17658] __should_failslab+0x81/0x90 [ 170.316904][T17658] should_failslab+0x5/0x20 [ 170.321404][T17658] kmem_cache_alloc+0x46/0x2e0 [ 170.326243][T17658] ? __cond_resched+0x11/0x40 [ 170.330905][T17658] __kernfs_new_node+0x6a/0x330 [ 170.335748][T17658] ? __down_write_common+0x42/0x810 [ 170.340933][T17658] ? idr_alloc_cyclic+0x249/0x2d0 [ 170.345949][T17658] ? __down_write_common+0x42/0x810 [ 170.351139][T17658] ? rb_insert_color+0x7e/0x310 [ 170.356058][T17658] kernfs_new_node+0x5b/0xd0 [ 170.360643][T17658] __kernfs_create_file+0x45/0x1a0 [ 170.365742][T17658] sysfs_add_file_mode_ns+0x1c1/0x250 [ 170.371103][T17658] internal_create_group+0x2e4/0x850 [ 170.376437][T17658] ? set_disk_ro+0x73/0x110 [ 170.381033][T17658] sysfs_create_group+0x1b/0x20 [ 170.385885][T17658] loop_configure+0xbcd/0xeb0 [ 170.390628][T17658] lo_ioctl+0x59b/0x1370 [ 170.394860][T17658] ? path_openat+0x18c3/0x1e90 [ 170.399622][T17658] ? putname+0xc6/0xe0 [ 170.403680][T17658] ? ___cache_free+0x3c/0x300 [ 170.408340][T17658] ? blkdev_common_ioctl+0x405/0x10a0 [ 170.413699][T17658] ? selinux_file_ioctl+0x8e0/0x970 [ 170.418886][T17658] ? lo_release+0x120/0x120 [ 170.423493][T17658] blkdev_ioctl+0x1d0/0x3e0 [ 170.428083][T17658] block_ioctl+0x6d/0x80 [ 170.432324][T17658] ? blkdev_iopoll+0x70/0x70 [ 170.436910][T17658] __se_sys_ioctl+0xcb/0x140 [ 170.441606][T17658] __x64_sys_ioctl+0x3f/0x50 [ 170.446195][T17658] do_syscall_64+0x3d/0x90 [ 170.450609][T17658] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.456518][T17658] RIP: 0033:0x4663b7 [ 170.460394][T17658] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.479986][T17658] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 170.488381][T17658] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 18:53:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000005000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 170.496336][T17658] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 170.504305][T17658] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 170.512272][T17658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 170.520241][T17658] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 170.530840][T17660] loop5: detected capacity change from 0 to 264192 [ 170.545767][T17669] loop0: detected capacity change from 0 to 264192 [ 170.576366][T17660] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 170.606140][T17669] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 170.610455][T17658] loop1: detected capacity change from 0 to 264192 18:53:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010038, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000005f000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 170.621297][T17669] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 170.625462][T17660] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 170.647410][T17660] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 170.665272][T17658] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 170.679279][T17658] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 170.695428][T17669] System zones: 0-2, 18-18, 34-35 [ 170.707449][T17658] System zones: 0-2, 18-18, 34-35 [ 170.713834][T17669] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:51 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010f12, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 170.715107][T17658] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 170.759677][T17665] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 170.770537][T17700] loop5: detected capacity change from 0 to 264192 18:53:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006020000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 170.780473][T17665] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 170.798019][T17665] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 170.822313][T17700] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 18:53:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01006c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 170.864929][T17700] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 170.868400][T17718] loop0: detected capacity change from 0 to 264192 [ 170.882506][T17700] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 170.909351][T17719] FAULT_INJECTION: forcing a failure. 18:53:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006030000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 170.909351][T17719] name failslab, interval 1, probability 0, space 0, times 0 [ 170.922049][T17719] CPU: 0 PID: 17719 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 170.930543][T17719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.934989][T17718] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 170.940683][T17719] Call Trace: [ 170.940694][T17719] dump_stack_lvl+0xb7/0x103 [ 170.957656][T17719] dump_stack+0x11/0x1a [ 170.961845][T17719] should_fail+0x23c/0x250 [ 170.966334][T17719] ? __kernfs_new_node+0x6a/0x330 [ 170.971654][T17719] __should_failslab+0x81/0x90 [ 170.976439][T17719] should_failslab+0x5/0x20 [ 170.980973][T17719] kmem_cache_alloc+0x46/0x2e0 [ 170.985840][T17719] ? __down_write_common+0x42/0x810 [ 170.987356][T17718] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 170.991074][T17719] __kernfs_new_node+0x6a/0x330 [ 170.999157][T17718] System zones: [ 171.003889][T17719] ? up_write+0x25/0xc0 [ 171.003910][T17719] kernfs_new_node+0x5b/0xd0 [ 171.007432][T17718] 0-2 [ 171.011560][T17719] __kernfs_create_file+0x45/0x1a0 [ 171.016150][T17718] , 18-18 [ 171.019225][T17719] sysfs_add_file_mode_ns+0x1c1/0x250 [ 171.024406][T17718] , 34-35 [ 171.027403][T17719] internal_create_group+0x2e4/0x850 [ 171.032744][T17718] [ 171.036648][T17718] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 171.040923][T17719] ? set_disk_ro+0x73/0x110 [ 171.058731][T17719] sysfs_create_group+0x1b/0x20 [ 171.063616][T17719] loop_configure+0xbcd/0xeb0 [ 171.068307][T17719] lo_ioctl+0x59b/0x1370 [ 171.072559][T17719] ? path_openat+0x18c3/0x1e90 [ 171.077413][T17719] ? putname+0xc6/0xe0 [ 171.081529][T17719] ? ___cache_free+0x3c/0x300 [ 171.086201][T17719] ? blkdev_common_ioctl+0x405/0x10a0 [ 171.091576][T17719] ? selinux_file_ioctl+0x8e0/0x970 [ 171.096827][T17719] ? lo_release+0x120/0x120 [ 171.101344][T17719] blkdev_ioctl+0x1d0/0x3e0 [ 171.105843][T17719] block_ioctl+0x6d/0x80 [ 171.110143][T17719] ? blkdev_iopoll+0x70/0x70 [ 171.114748][T17719] __se_sys_ioctl+0xcb/0x140 [ 171.119343][T17719] __x64_sys_ioctl+0x3f/0x50 [ 171.123960][T17719] do_syscall_64+0x3d/0x90 [ 171.128435][T17719] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.134308][T17719] RIP: 0033:0x4663b7 [ 171.138317][T17719] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.157902][T17719] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 171.166292][T17719] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 171.174244][T17719] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 171.182247][T17719] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 171.190335][T17719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 171.198342][T17719] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 171.206562][T17719] loop1: detected capacity change from 0 to 264192 [ 171.224198][T17719] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 171.232098][T17741] loop3: detected capacity change from 0 to 264192 [ 171.234097][T17719] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 171.252197][T17719] System zones: 0-2, 18-18, 34-35 [ 171.257830][T17719] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 171.283768][T17741] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 171.306479][T17741] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 171.324362][T17741] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:53 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x34) 18:53:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010039, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006040000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:53 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010074, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006050000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 173.292485][T17768] FAULT_INJECTION: forcing a failure. [ 173.292485][T17768] name failslab, interval 1, probability 0, space 0, times 0 [ 173.302680][T17773] loop5: detected capacity change from 0 to 264192 [ 173.305127][T17768] CPU: 0 PID: 17768 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 173.305147][T17768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.305157][T17768] Call Trace: [ 173.305164][T17768] dump_stack_lvl+0xb7/0x103 [ 173.337992][T17768] dump_stack+0x11/0x1a [ 173.342153][T17768] should_fail+0x23c/0x250 [ 173.343631][T17763] loop3: detected capacity change from 0 to 264192 [ 173.346573][T17768] ? __kernfs_new_node+0x6a/0x330 [ 173.358080][T17768] __should_failslab+0x81/0x90 [ 173.360980][T17770] loop0: detected capacity change from 0 to 264192 [ 173.362843][T17768] should_failslab+0x5/0x20 [ 173.362868][T17768] kmem_cache_alloc+0x46/0x2e0 [ 173.362885][T17768] ? __down_write_common+0x42/0x810 [ 173.362906][T17768] __kernfs_new_node+0x6a/0x330 [ 173.362975][T17768] ? up_write+0x25/0xc0 [ 173.392920][T17768] kernfs_new_node+0x5b/0xd0 [ 173.397536][T17768] __kernfs_create_file+0x45/0x1a0 [ 173.402636][T17768] sysfs_add_file_mode_ns+0x1c1/0x250 [ 173.408033][T17768] internal_create_group+0x2e4/0x850 [ 173.413417][T17768] ? set_disk_ro+0x73/0x110 [ 173.417920][T17768] sysfs_create_group+0x1b/0x20 [ 173.422781][T17768] loop_configure+0xbcd/0xeb0 [ 173.427453][T17768] lo_ioctl+0x59b/0x1370 [ 173.431714][T17768] ? path_openat+0x18c3/0x1e90 [ 173.436772][T17768] ? putname+0xc6/0xe0 [ 173.440901][T17768] ? ___cache_free+0x3c/0x300 [ 173.445598][T17768] ? blkdev_common_ioctl+0x405/0x10a0 [ 173.450956][T17768] ? selinux_file_ioctl+0x8e0/0x970 [ 173.456187][T17768] ? lo_release+0x120/0x120 [ 173.460676][T17768] blkdev_ioctl+0x1d0/0x3e0 [ 173.465186][T17768] block_ioctl+0x6d/0x80 [ 173.469423][T17768] ? blkdev_iopoll+0x70/0x70 [ 173.474053][T17768] __se_sys_ioctl+0xcb/0x140 [ 173.478648][T17768] __x64_sys_ioctl+0x3f/0x50 [ 173.483240][T17768] do_syscall_64+0x3d/0x90 [ 173.487648][T17768] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.493536][T17768] RIP: 0033:0x4663b7 [ 173.497419][T17768] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.517115][T17768] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.525509][T17768] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 173.533475][T17768] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 173.541515][T17768] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 173.549475][T17768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 173.557434][T17768] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x34) [ 173.585697][T17773] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 173.594969][T17770] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 173.618674][T17770] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 173.635190][T17773] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 173.642615][T17770] System zones: 0-2, 18-18 [ 173.652807][T17773] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 173.652807][T17770] , 34-35 [ 173.657238][T17773] EXT4-fs mount: 50 callbacks suppressed 18:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006060000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 173.657249][T17773] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 173.669387][T17770] [ 173.670040][T17770] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 173.701899][T17770] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x34) [ 173.737559][T17763] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 173.747365][T17763] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 173.764920][T17763] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 173.777107][T17763] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011020, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006070000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 173.797036][T17768] loop1: detected capacity change from 0 to 264192 [ 173.814939][T17768] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01007a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 173.852717][T17768] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006080000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 173.897219][T17768] System zones: 0-2, 18-18, 34-35 [ 173.902365][T17828] loop5: detected capacity change from 0 to 264192 [ 173.907254][T17768] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 173.920016][T17768] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 173.924690][T17832] loop0: detected capacity change from 0 to 264192 [ 173.974482][T17828] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 174.000442][T17832] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 174.005254][T17828] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 174.027201][T17828] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 174.039457][T17828] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 174.055229][T17832] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060a0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 174.070019][T17851] loop3: detected capacity change from 0 to 264192 [ 174.077843][T17832] System zones: 0-2, 18-18, 34-35 [ 174.094083][T17832] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 174.105153][T17832] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 174.110612][T17858] FAULT_INJECTION: forcing a failure. [ 174.110612][T17858] name failslab, interval 1, probability 0, space 0, times 0 [ 174.128451][T17858] CPU: 1 PID: 17858 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 174.136864][T17858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.146909][T17858] Call Trace: [ 174.150178][T17858] dump_stack_lvl+0xb7/0x103 [ 174.154756][T17858] dump_stack+0x11/0x1a [ 174.158896][T17858] should_fail+0x23c/0x250 [ 174.163349][T17858] ? __kernfs_new_node+0x6a/0x330 [ 174.168373][T17858] __should_failslab+0x81/0x90 [ 174.173200][T17858] should_failslab+0x5/0x20 [ 174.177692][T17858] kmem_cache_alloc+0x46/0x2e0 [ 174.182621][T17858] ? __down_write_common+0x42/0x810 [ 174.187977][T17858] __kernfs_new_node+0x6a/0x330 [ 174.192832][T17858] ? up_write+0x25/0xc0 [ 174.197015][T17858] kernfs_new_node+0x5b/0xd0 [ 174.201659][T17858] __kernfs_create_file+0x45/0x1a0 [ 174.206916][T17858] sysfs_add_file_mode_ns+0x1c1/0x250 [ 174.212401][T17858] internal_create_group+0x2e4/0x850 [ 174.217706][T17858] ? set_disk_ro+0x73/0x110 [ 174.222294][T17858] sysfs_create_group+0x1b/0x20 [ 174.227153][T17858] loop_configure+0xbcd/0xeb0 [ 174.231842][T17858] lo_ioctl+0x59b/0x1370 [ 174.236072][T17858] ? path_openat+0x18c3/0x1e90 [ 174.241080][T17858] ? putname+0xc6/0xe0 [ 174.245150][T17858] ? ___cache_free+0x3c/0x300 [ 174.249813][T17858] ? blkdev_common_ioctl+0x405/0x10a0 [ 174.255168][T17858] ? selinux_file_ioctl+0x8e0/0x970 [ 174.260450][T17858] ? lo_release+0x120/0x120 [ 174.264958][T17858] blkdev_ioctl+0x1d0/0x3e0 [ 174.269462][T17858] block_ioctl+0x6d/0x80 [ 174.273697][T17858] ? blkdev_iopoll+0x70/0x70 [ 174.278270][T17858] __se_sys_ioctl+0xcb/0x140 [ 174.283102][T17858] __x64_sys_ioctl+0x3f/0x50 [ 174.287677][T17858] do_syscall_64+0x3d/0x90 [ 174.292098][T17858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.297985][T17858] RIP: 0033:0x4663b7 [ 174.301856][T17858] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.321543][T17858] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.329935][T17858] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 174.337966][T17858] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 174.345927][T17858] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 174.353903][T17858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 174.361871][T17858] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011100, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01003b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060b0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 174.386727][T17858] loop1: detected capacity change from 0 to 264192 [ 174.418826][T17851] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 174.439501][T17858] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 174.451377][T17851] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 174.469370][T17851] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006180000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 174.481564][T17851] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 174.500890][T17885] loop0: detected capacity change from 0 to 264192 [ 174.511019][T17858] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 174.511715][T17884] loop5: detected capacity change from 0 to 264192 [ 174.527972][T17858] System zones: 0-2, 18-18, 34-35 18:53:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100a7, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:55 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 174.546193][T17858] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 174.557451][T17858] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 174.583123][T17885] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:53:55 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000061c0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 174.607410][T17884] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 174.635401][T17885] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 174.680738][T17885] System zones: 0-2, 18-18, 34-35 [ 174.682149][T17884] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 174.686284][T17885] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 174.703524][T17884] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:55 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011200, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006260000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 174.714675][T17885] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 174.726932][T17884] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 174.759364][T17917] loop3: detected capacity change from 0 to 264192 [ 174.769542][T17925] loop1: detected capacity change from 0 to 264192 [ 174.802064][T17925] FAULT_INJECTION: forcing a failure. [ 174.802064][T17925] name failslab, interval 1, probability 0, space 0, times 0 [ 174.815075][T17925] CPU: 0 PID: 17925 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 174.823483][T17925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.833605][T17925] Call Trace: [ 174.836870][T17925] dump_stack_lvl+0xb7/0x103 [ 174.841469][T17925] dump_stack+0x11/0x1a [ 174.845605][T17925] should_fail+0x23c/0x250 [ 174.850086][T17925] __should_failslab+0x81/0x90 [ 174.854920][T17925] ? kobject_uevent_env+0x1a7/0xc40 [ 174.860168][T17925] should_failslab+0x5/0x20 [ 174.864655][T17925] kmem_cache_alloc_trace+0x49/0x310 [ 174.869936][T17925] ? vprintk+0x7f/0x90 [ 174.874046][T17925] ? dev_uevent_filter+0x70/0x70 [ 174.878977][T17925] kobject_uevent_env+0x1a7/0xc40 [ 174.883990][T17925] ? set_capacity_and_notify+0x1eb/0x200 [ 174.889653][T17925] kobject_uevent+0x18/0x20 [ 174.894164][T17925] loop_configure+0xce1/0xeb0 [ 174.898828][T17925] lo_ioctl+0x59b/0x1370 [ 174.903103][T17925] ? path_openat+0x18c3/0x1e90 [ 174.907976][T17925] ? putname+0xc6/0xe0 [ 174.912029][T17925] ? ___cache_free+0x3c/0x300 [ 174.916784][T17925] ? blkdev_common_ioctl+0x405/0x10a0 [ 174.922138][T17925] ? selinux_file_ioctl+0x8e0/0x970 [ 174.927323][T17925] ? lo_release+0x120/0x120 [ 174.931830][T17925] blkdev_ioctl+0x1d0/0x3e0 [ 174.936350][T17925] block_ioctl+0x6d/0x80 [ 174.940585][T17925] ? blkdev_iopoll+0x70/0x70 [ 174.945156][T17925] __se_sys_ioctl+0xcb/0x140 [ 174.949881][T17925] __x64_sys_ioctl+0x3f/0x50 [ 174.954461][T17925] do_syscall_64+0x3d/0x90 [ 174.958871][T17925] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.964752][T17925] RIP: 0033:0x4663b7 [ 174.968634][T17925] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.988226][T17925] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:53:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010048, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 174.996675][T17925] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 175.004740][T17925] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 175.012834][T17925] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 175.020878][T17925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 175.028872][T17925] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006fe0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 175.073927][T17917] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 175.104488][T17917] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:55 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006040200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 175.104996][T17951] loop0: detected capacity change from 0 to 264192 [ 175.122110][T17917] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 175.141067][T17917] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 175.161325][T17925] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:53:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100a8, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 175.189614][T17925] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 175.201515][T17960] loop5: detected capacity change from 0 to 264192 [ 175.214404][T17925] System zones: 0-2, 18-18, 34-35 [ 175.219908][T17925] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:55 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 175.231022][T17925] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:55 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 175.280181][T17951] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 175.289528][T17960] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 175.301513][T17980] loop3: detected capacity change from 0 to 264192 [ 175.316839][T17981] loop1: detected capacity change from 0 to 264192 [ 175.317093][T17951] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 175.356644][T17960] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 175.359180][T17951] System zones: 0-2 [ 175.374529][T17960] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 175.374556][T17960] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 175.379544][T17981] FAULT_INJECTION: forcing a failure. [ 175.379544][T17981] name failslab, interval 1, probability 0, space 0, times 0 [ 175.390558][T17951] , 18-18, 34-35 [ 175.401057][T17981] CPU: 0 PID: 17981 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 175.401099][T17981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.415257][T17951] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 175.417254][T17981] Call Trace: [ 175.417263][T17981] dump_stack_lvl+0xb7/0x103 [ 175.425684][T17951] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 175.435682][T17981] dump_stack+0x11/0x1a [ 175.435705][T17981] should_fail+0x23c/0x250 [ 175.473695][T17981] ? kzalloc+0x1d/0x30 [ 175.477754][T17981] __should_failslab+0x81/0x90 [ 175.482544][T17981] should_failslab+0x5/0x20 [ 175.487083][T17981] __kmalloc+0x66/0x340 [ 175.491223][T17981] kzalloc+0x1d/0x30 [ 175.495152][T17981] kobject_get_path+0x7c/0x110 [ 175.499901][T17981] kobject_uevent_env+0x1be/0xc40 [ 175.504979][T17981] ? set_capacity_and_notify+0x1eb/0x200 [ 175.510594][T17981] kobject_uevent+0x18/0x20 [ 175.515086][T17981] loop_configure+0xce1/0xeb0 [ 175.519821][T17981] lo_ioctl+0x59b/0x1370 [ 175.524135][T17981] ? path_openat+0x18c3/0x1e90 [ 175.528958][T17981] ? putname+0xc6/0xe0 [ 175.533050][T17981] ? ___cache_free+0x3c/0x300 [ 175.537839][T17981] ? blkdev_common_ioctl+0x405/0x10a0 [ 175.543193][T17981] ? selinux_file_ioctl+0x8e0/0x970 [ 175.548396][T17981] ? lo_release+0x120/0x120 [ 175.552886][T17981] blkdev_ioctl+0x1d0/0x3e0 [ 175.557573][T17981] block_ioctl+0x6d/0x80 [ 175.561805][T17981] ? blkdev_iopoll+0x70/0x70 [ 175.566406][T17981] __se_sys_ioctl+0xcb/0x140 [ 175.570994][T17981] __x64_sys_ioctl+0x3f/0x50 [ 175.575573][T17981] do_syscall_64+0x3d/0x90 [ 175.580340][T17981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.586234][T17981] RIP: 0033:0x4663b7 [ 175.590134][T17981] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.609727][T17981] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 175.618121][T17981] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 175.626090][T17981] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 175.634135][T17981] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 175.642230][T17981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 175.650254][T17981] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006020400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01120a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 175.666261][T17980] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:53:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01004c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 175.723685][T17980] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 175.741330][T17980] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 175.745128][T17981] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 175.753514][T17980] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006060400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100a9, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 175.835334][T17981] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 175.845379][T18024] loop0: detected capacity change from 0 to 264192 [ 175.859012][T17981] System zones: 0-2, 18-18, 34-35 [ 175.865470][T17981] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:53:56 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006800400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 175.876604][T17981] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 175.883839][T18028] loop5: detected capacity change from 0 to 264192 [ 175.895406][T18024] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 175.935312][T18024] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 175.938556][T18028] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 175.943414][T18024] System zones: 0-2, 18-18, 34-35 [ 175.958715][T18024] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 175.969794][T18024] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 175.984131][T18041] loop3: detected capacity change from 0 to 264192 [ 176.014397][T18028] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 176.031973][T18028] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 176.034493][T18054] loop1: detected capacity change from 0 to 264192 [ 176.044159][T18028] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 176.060546][T18054] FAULT_INJECTION: forcing a failure. [ 176.060546][T18054] name failslab, interval 1, probability 0, space 0, times 0 [ 176.073721][T18054] CPU: 0 PID: 18054 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 176.082182][T18054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.092235][T18054] Call Trace: [ 176.095505][T18054] dump_stack_lvl+0xb7/0x103 [ 176.100100][T18054] dump_stack+0x11/0x1a [ 176.104291][T18054] should_fail+0x23c/0x250 [ 176.108697][T18054] __should_failslab+0x81/0x90 [ 176.113451][T18054] should_failslab+0x5/0x20 [ 176.118012][T18054] kmem_cache_alloc_node+0x58/0x2b0 [ 176.123223][T18054] ? __alloc_skb+0xed/0x420 [ 176.127764][T18054] __alloc_skb+0xed/0x420 [ 176.132087][T18054] alloc_uevent_skb+0x5b/0x120 [ 176.137051][T18054] kobject_uevent_env+0x863/0xc40 [ 176.142064][T18054] ? set_capacity_and_notify+0x1eb/0x200 [ 176.147684][T18054] kobject_uevent+0x18/0x20 [ 176.152182][T18054] loop_configure+0xce1/0xeb0 [ 176.156866][T18054] lo_ioctl+0x59b/0x1370 [ 176.161167][T18054] ? path_openat+0x18c3/0x1e90 [ 176.166017][T18054] ? putname+0xc6/0xe0 [ 176.170077][T18054] ? ___cache_free+0x3c/0x300 [ 176.174739][T18054] ? blkdev_common_ioctl+0x405/0x10a0 [ 176.180127][T18054] ? selinux_file_ioctl+0x8e0/0x970 [ 176.185320][T18054] ? lo_release+0x120/0x120 [ 176.189812][T18054] blkdev_ioctl+0x1d0/0x3e0 [ 176.194301][T18054] block_ioctl+0x6d/0x80 [ 176.198737][T18054] ? blkdev_iopoll+0x70/0x70 [ 176.203312][T18054] __se_sys_ioctl+0xcb/0x140 [ 176.207890][T18054] __x64_sys_ioctl+0x3f/0x50 [ 176.212494][T18054] do_syscall_64+0x3d/0x90 [ 176.216906][T18054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.222795][T18054] RIP: 0033:0x4663b7 [ 176.226672][T18054] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.246281][T18054] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.255378][T18054] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 18:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01120b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 176.263339][T18054] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 176.271297][T18054] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 176.279276][T18054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 176.287240][T18054] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 176.307881][T18041] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 176.324997][T18054] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 176.337698][T18041] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000062f0500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 176.355249][T18041] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 176.367431][T18041] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 176.398961][T18054] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 176.419287][T18054] System zones: 0-2, 18-18, 34-35 18:53:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010060, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100fe, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 176.440639][T18082] loop0: detected capacity change from 0 to 264192 [ 176.447910][T18054] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 176.459187][T18054] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 176.472410][T18082] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 176.482428][T18082] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 176.503601][T18082] System zones: 0-2, 18-18, 34-35 18:53:57 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 176.548762][T18082] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 176.556908][T18097] loop3: detected capacity change from 0 to 264192 [ 176.559985][T18082] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 176.586166][T18097] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 176.605082][T18097] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 176.622763][T18097] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 176.635121][T18097] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 176.652563][T18108] loop5: detected capacity change from 0 to 264192 [ 176.660773][T18113] loop1: detected capacity change from 0 to 264192 [ 176.672463][T18113] FAULT_INJECTION: forcing a failure. [ 176.672463][T18113] name failslab, interval 1, probability 0, space 0, times 0 [ 176.685207][T18113] CPU: 1 PID: 18113 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 176.693787][T18113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.703843][T18113] Call Trace: [ 176.707114][T18113] dump_stack_lvl+0xb7/0x103 [ 176.711732][T18113] dump_stack+0x11/0x1a [ 176.715870][T18113] should_fail+0x23c/0x250 [ 176.720362][T18113] __should_failslab+0x81/0x90 [ 176.725109][T18113] should_failslab+0x5/0x20 [ 176.729753][T18113] kmem_cache_alloc_node+0x58/0x2b0 [ 176.734938][T18113] ? __alloc_skb+0xed/0x420 [ 176.739426][T18113] __alloc_skb+0xed/0x420 [ 176.743854][T18113] alloc_uevent_skb+0x5b/0x120 [ 176.748602][T18113] kobject_uevent_env+0x863/0xc40 [ 176.753668][T18113] ? set_capacity_and_notify+0x1eb/0x200 [ 176.759302][T18113] kobject_uevent+0x18/0x20 [ 176.763811][T18113] loop_configure+0xce1/0xeb0 [ 176.768475][T18113] lo_ioctl+0x59b/0x1370 [ 176.772806][T18113] ? path_openat+0x18c3/0x1e90 [ 176.777560][T18113] ? putname+0xc6/0xe0 [ 176.781616][T18113] ? ___cache_free+0x3c/0x300 [ 176.786280][T18113] ? blkdev_common_ioctl+0x405/0x10a0 [ 176.791635][T18113] ? selinux_file_ioctl+0x8e0/0x970 [ 176.797015][T18113] ? lo_release+0x120/0x120 [ 176.801506][T18113] blkdev_ioctl+0x1d0/0x3e0 [ 176.806029][T18113] block_ioctl+0x6d/0x80 [ 176.810266][T18113] ? blkdev_iopoll+0x70/0x70 [ 176.814891][T18113] __se_sys_ioctl+0xcb/0x140 [ 176.819466][T18113] __x64_sys_ioctl+0x3f/0x50 [ 176.824039][T18113] do_syscall_64+0x3d/0x90 [ 176.828496][T18113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.834381][T18113] RIP: 0033:0x4663b7 18:53:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01120c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 176.838263][T18113] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.857862][T18113] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.866267][T18113] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 176.874282][T18113] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 176.882321][T18113] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 176.890383][T18113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 176.898355][T18113] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006040600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 18:53:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010204, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 176.975339][T18108] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 176.986150][T18124] loop0: detected capacity change from 0 to 264192 18:53:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 177.025248][T18108] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 177.042842][T18108] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 177.055060][T18108] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 177.063526][T18124] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:53:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006c00900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 177.087984][T18113] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 177.108529][T18124] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 177.126203][T18145] loop3: detected capacity change from 0 to 264192 [ 177.151539][T18113] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 177.156214][T18145] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 177.162641][T18124] System zones: 0-2, 18-18, 34-35 [ 177.175263][T18124] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 177.183094][T18113] System zones: 0-2 [ 177.186619][T18124] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 177.186678][T18113] , 18-18, 34-35 [ 177.206980][T18113] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 177.218374][T18113] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 177.234577][T18145] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:53:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010068, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 18:53:57 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01120d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 177.252322][T18145] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 177.264620][T18145] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010300, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 177.343191][T18172] loop1: detected capacity change from 0 to 264192 [ 177.349741][T18172] FAULT_INJECTION: forcing a failure. [ 177.349741][T18172] name failslab, interval 1, probability 0, space 0, times 0 [ 177.362367][T18172] CPU: 1 PID: 18172 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 177.370782][T18172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.380887][T18172] Call Trace: [ 177.384214][T18172] dump_stack_lvl+0xb7/0x103 [ 177.388808][T18172] dump_stack+0x11/0x1a [ 177.393102][T18172] should_fail+0x23c/0x250 [ 177.397593][T18172] __should_failslab+0x81/0x90 [ 177.402352][T18172] should_failslab+0x5/0x20 [ 177.406841][T18172] kmem_cache_alloc_node+0x58/0x2b0 [ 177.412029][T18172] ? __alloc_skb+0xed/0x420 [ 177.416655][T18172] __alloc_skb+0xed/0x420 [ 177.420982][T18172] alloc_uevent_skb+0x5b/0x120 [ 177.425769][T18172] kobject_uevent_env+0x863/0xc40 [ 177.430785][T18172] ? set_capacity_and_notify+0x1eb/0x200 [ 177.436449][T18172] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 177.441984][T18172] kobject_uevent+0x18/0x20 [ 177.446483][T18172] loop_configure+0xce1/0xeb0 [ 177.451147][T18172] lo_ioctl+0x59b/0x1370 [ 177.455374][T18172] ? path_openat+0x18c3/0x1e90 [ 177.460138][T18172] ? putname+0xc6/0xe0 [ 177.464191][T18172] ? ___cache_free+0x3c/0x300 [ 177.468895][T18172] ? blkdev_common_ioctl+0x405/0x10a0 [ 177.474256][T18172] ? selinux_file_ioctl+0x8e0/0x970 [ 177.479473][T18172] ? lo_release+0x120/0x120 [ 177.484047][T18172] blkdev_ioctl+0x1d0/0x3e0 [ 177.488583][T18172] block_ioctl+0x6d/0x80 [ 177.492902][T18172] ? blkdev_iopoll+0x70/0x70 [ 177.497500][T18172] __se_sys_ioctl+0xcb/0x140 [ 177.502075][T18172] __x64_sys_ioctl+0x3f/0x50 [ 177.506742][T18172] do_syscall_64+0x3d/0x90 [ 177.511156][T18172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.517103][T18172] RIP: 0033:0x4663b7 [ 177.520978][T18172] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 177.540568][T18172] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.549050][T18172] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 177.557109][T18172] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 177.565064][T18172] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 177.573023][T18172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 177.580998][T18172] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 18:53:58 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 177.605174][T18189] loop5: detected capacity change from 0 to 264192 [ 177.612510][T18201] loop3: detected capacity change from 0 to 264192 [ 177.615076][T18192] loop0: detected capacity change from 0 to 264192 [ 177.629764][T18189] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 177.643209][T18172] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 177.654994][T18201] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 177.683750][T18172] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 177.689749][T18189] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 177.694343][T18172] System zones: 0-2, 18-18, 34-35 [ 177.709264][T18189] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 177.714630][T18172] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 177.726520][T18189] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:58 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:58 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 177.737533][T18172] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 177.752255][T18192] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 177.773226][T18201] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 177.790893][T18201] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:53:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01006c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 177.803164][T18201] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010319, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 177.849945][T18192] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:58 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 177.890811][T18192] System zones: 0-2, 18-18, 34-35 [ 177.928912][T18250] loop1: detected capacity change from 0 to 264192 [ 177.943008][T18192] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 177.954146][T18192] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 177.967430][T18251] loop5: detected capacity change from 0 to 264192 [ 177.971241][T18250] FAULT_INJECTION: forcing a failure. [ 177.971241][T18250] name failslab, interval 1, probability 0, space 0, times 0 [ 177.986798][T18250] CPU: 1 PID: 18250 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 177.995236][T18250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.005286][T18250] Call Trace: [ 178.006301][T18255] loop3: detected capacity change from 0 to 264192 [ 178.008561][T18250] dump_stack_lvl+0xb7/0x103 [ 178.020940][T18250] dump_stack+0x11/0x1a [ 178.025097][T18250] should_fail+0x23c/0x250 [ 178.029701][T18250] ? skb_clone+0x12c/0x1f0 [ 178.034128][T18250] __should_failslab+0x81/0x90 [ 178.038888][T18250] should_failslab+0x5/0x20 [ 178.043396][T18250] kmem_cache_alloc+0x46/0x2e0 [ 178.048157][T18250] skb_clone+0x12c/0x1f0 [ 178.052457][T18250] netlink_broadcast_filtered+0x4fd/0xb60 [ 178.058167][T18250] ? skb_put+0xb9/0xf0 [ 178.062219][T18250] netlink_broadcast+0x35/0x50 [ 178.067005][T18250] kobject_uevent_env+0x8c9/0xc40 [ 178.072036][T18250] ? set_capacity_and_notify+0x1eb/0x200 [ 178.077667][T18250] kobject_uevent+0x18/0x20 [ 178.082166][T18250] loop_configure+0xce1/0xeb0 [ 178.086841][T18250] lo_ioctl+0x59b/0x1370 [ 178.091147][T18250] ? path_openat+0x18c3/0x1e90 [ 178.095901][T18250] ? putname+0xc6/0xe0 [ 178.100006][T18250] ? ___cache_free+0x3c/0x300 [ 178.104674][T18250] ? blkdev_common_ioctl+0x405/0x10a0 [ 178.110045][T18250] ? selinux_file_ioctl+0x8e0/0x970 [ 178.115230][T18250] ? lo_release+0x120/0x120 [ 178.119763][T18250] blkdev_ioctl+0x1d0/0x3e0 [ 178.124245][T18250] block_ioctl+0x6d/0x80 [ 178.128528][T18250] ? blkdev_iopoll+0x70/0x70 [ 178.133127][T18250] __se_sys_ioctl+0xcb/0x140 [ 178.137711][T18250] __x64_sys_ioctl+0x3f/0x50 [ 178.142301][T18250] do_syscall_64+0x3d/0x90 [ 178.146717][T18250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.152660][T18250] RIP: 0033:0x4663b7 [ 178.156552][T18250] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01120e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:58 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 178.176752][T18250] RSP: 002b:00007ffa352f3f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.185148][T18250] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 178.193112][T18250] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 178.201067][T18250] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 178.209021][T18250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 178.216985][T18250] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 178.238241][T18255] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 178.266608][T18251] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 178.279723][T18251] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 178.286607][T18255] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 178.297424][T18251] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:53:58 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 178.314878][T18255] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 178.327006][T18251] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 178.339120][T18255] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 178.373920][T18250] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:53:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010074, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 178.396445][T18277] loop0: detected capacity change from 0 to 264192 [ 178.416788][T18250] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 178.458091][T18250] System zones: 0-2, 18-18, 34-35 [ 178.468398][T18250] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 178.479486][T18250] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 178.483041][T18277] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:53:59 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01031a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 178.533137][T18295] loop5: detected capacity change from 0 to 264192 [ 178.572075][T18277] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:53:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006052f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 178.580235][T18310] loop3: detected capacity change from 0 to 264192 [ 178.586424][T18295] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 178.607335][T18310] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 178.613390][T18277] System zones: 0-2, 18-18, 34-35 [ 178.632169][T18277] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 178.635464][T18295] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 178.643339][T18277] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 178.660807][T18295] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 178.674240][T18310] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 178.683531][T18295] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 178.700991][T18310] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 178.723687][T18310] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:53:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006003f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01120f, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 178.729070][T18320] loop1: detected capacity change from 0 to 264192 [ 178.757902][T18320] FAULT_INJECTION: forcing a failure. [ 178.757902][T18320] name failslab, interval 1, probability 0, space 0, times 0 [ 178.770578][T18320] CPU: 0 PID: 18320 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 178.779001][T18320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.789082][T18320] Call Trace: [ 178.792355][T18320] dump_stack_lvl+0xb7/0x103 [ 178.796946][T18320] dump_stack+0x11/0x1a [ 178.801219][T18320] should_fail+0x23c/0x250 [ 178.805683][T18320] ? getname_flags+0x84/0x3f0 [ 178.810534][T18320] __should_failslab+0x81/0x90 [ 178.815290][T18320] should_failslab+0x5/0x20 [ 178.819864][T18320] kmem_cache_alloc+0x46/0x2e0 [ 178.824695][T18320] getname_flags+0x84/0x3f0 [ 178.829415][T18320] ? switch_fpu_return+0xa/0x10 [ 178.834251][T18320] __x64_sys_mkdir+0x31/0x50 [ 178.838927][T18320] do_syscall_64+0x3d/0x90 [ 178.843521][T18320] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.849425][T18320] RIP: 0033:0x465707 [ 178.853299][T18320] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.872986][T18320] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 18:53:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01031b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 178.881427][T18320] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 178.889493][T18320] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 178.897458][T18320] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 178.905590][T18320] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 178.914157][T18320] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:53:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01007a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006004000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:53:59 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010402, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:53:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006048000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 179.057647][T18349] loop0: detected capacity change from 0 to 264192 [ 179.075827][T18349] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 179.080967][T18372] loop1: detected capacity change from 0 to 264192 [ 179.092109][T18370] loop3: detected capacity change from 0 to 264192 [ 179.098575][T18364] loop5: detected capacity change from 0 to 264192 18:53:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 179.099208][T18349] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 179.124861][T18372] FAULT_INJECTION: forcing a failure. [ 179.124861][T18372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.133964][T18370] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 179.138028][T18372] CPU: 1 PID: 18372 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 179.155488][T18372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.165674][T18372] Call Trace: [ 179.168952][T18372] dump_stack_lvl+0xb7/0x103 [ 179.173577][T18372] dump_stack+0x11/0x1a [ 179.177737][T18372] should_fail+0x23c/0x250 [ 179.182166][T18372] should_fail_usercopy+0x16/0x20 [ 179.187251][T18372] strncpy_from_user+0x21/0x250 [ 179.192115][T18372] getname_flags+0xb8/0x3f0 [ 179.196618][T18372] __x64_sys_mkdir+0x31/0x50 [ 179.201218][T18372] do_syscall_64+0x3d/0x90 [ 179.204325][T18370] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 179.205678][T18372] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.223148][T18370] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 179.229081][T18372] RIP: 0033:0x465707 [ 179.241263][T18370] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 179.245123][T18372] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.275224][T18372] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 179.283721][T18372] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 179.291787][T18372] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 179.299872][T18372] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 179.307847][T18372] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 179.311234][T18349] System zones: [ 179.315814][T18372] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 179.319585][T18349] 0-2, 18-18, 34-35 [ 179.346910][T18364] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 18:53:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000609c000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 179.371043][T18364] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 179.388694][T18364] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 179.399318][T18349] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:53:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 179.400936][T18364] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 179.412141][T18349] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100a7, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011800, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010406, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006fffe00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 179.540886][T18418] loop1: detected capacity change from 0 to 264192 [ 179.547552][T18417] loop3: detected capacity change from 0 to 264192 [ 179.562022][T18428] loop5: detected capacity change from 0 to 264192 [ 179.568205][T18418] FAULT_INJECTION: forcing a failure. [ 179.568205][T18418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.574349][T18430] loop0: detected capacity change from 0 to 264192 [ 179.581629][T18418] CPU: 0 PID: 18418 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 179.596510][T18418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.606562][T18418] Call Trace: [ 179.609929][T18418] dump_stack_lvl+0xb7/0x103 [ 179.614530][T18418] dump_stack+0x11/0x1a [ 179.618681][T18418] should_fail+0x23c/0x250 [ 179.623199][T18418] should_fail_usercopy+0x16/0x20 [ 179.628226][T18418] strncpy_from_user+0x21/0x250 [ 179.633094][T18418] getname_flags+0xb8/0x3f0 [ 179.633919][T18430] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 179.637609][T18418] __x64_sys_mkdir+0x31/0x50 [ 179.637638][T18418] do_syscall_64+0x3d/0x90 [ 179.655708][T18418] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.661620][T18418] RIP: 0033:0x465707 [ 179.665600][T18418] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.685772][T18418] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 179.694195][T18418] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 179.694691][T18430] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 179.702382][T18418] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 179.702399][T18418] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 179.702412][T18418] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 18:54:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006feff00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) [ 179.702424][T18418] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 179.721167][T18430] System zones: 0-2, 18-18, 34-35 [ 179.747656][T18417] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 179.756922][T18428] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 179.783564][T18417] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 179.801131][T18417] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 179.808304][T18428] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 179.813372][T18417] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 179.830821][T18428] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 179.853513][T18428] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 179.858154][T18430] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:00 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010410, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 179.875170][T18430] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:54:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000100000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 179.935605][T18462] loop1: detected capacity change from 0 to 264192 [ 179.943098][T18462] FAULT_INJECTION: forcing a failure. [ 179.943098][T18462] name failslab, interval 1, probability 0, space 0, times 0 [ 179.955919][T18462] CPU: 0 PID: 18462 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 179.964338][T18462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.974061][T18470] loop3: detected capacity change from 0 to 264192 [ 179.974438][T18462] Call Trace: [ 179.974447][T18462] dump_stack_lvl+0xb7/0x103 [ 179.988818][T18462] dump_stack+0x11/0x1a [ 179.992974][T18462] should_fail+0x23c/0x250 [ 179.997458][T18462] ? ext4_alloc_inode+0x27/0x300 [ 180.002385][T18462] __should_failslab+0x81/0x90 [ 180.007135][T18462] ? set_qf_name+0x230/0x230 [ 180.011784][T18462] should_failslab+0x5/0x20 [ 180.016331][T18462] kmem_cache_alloc+0x46/0x2e0 [ 180.021081][T18462] ? ebitmap_destroy+0x91/0xa0 [ 180.025924][T18462] ? set_qf_name+0x230/0x230 [ 180.030502][T18462] ext4_alloc_inode+0x27/0x300 [ 180.035256][T18462] ? set_qf_name+0x230/0x230 [ 180.039849][T18462] new_inode_pseudo+0x38/0x1c0 [ 180.044603][T18462] new_inode+0x21/0x120 [ 180.048749][T18462] __ext4_new_inode+0x126/0x2f90 [ 180.053678][T18462] ? __dquot_initialize+0x131/0x7e0 [ 180.058888][T18462] ext4_mkdir+0x28a/0x760 [ 180.063206][T18462] vfs_mkdir+0x2c3/0x3e0 [ 180.067443][T18462] do_mkdirat+0x12e/0x2e0 [ 180.071765][T18462] __x64_sys_mkdir+0x40/0x50 [ 180.076437][T18462] do_syscall_64+0x3d/0x90 [ 180.080859][T18462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.086746][T18462] RIP: 0033:0x465707 [ 180.090623][T18462] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.110218][T18462] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 180.118613][T18462] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 180.126574][T18462] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 18:54:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100a8, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 180.134547][T18462] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 180.142561][T18462] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 180.150517][T18462] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011801, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 18:54:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 180.189079][T18470] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:54:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000200000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:00 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 180.242271][T18470] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 180.260070][T18470] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 180.272263][T18470] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64], 0xe8}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 180.302180][T18500] loop5: detected capacity change from 0 to 264192 [ 180.316272][T18503] loop1: detected capacity change from 0 to 264192 [ 180.342366][T18514] loop0: detected capacity change from 0 to 264192 [ 180.357674][T18503] FAULT_INJECTION: forcing a failure. [ 180.357674][T18503] name failslab, interval 1, probability 0, space 0, times 0 [ 180.370345][T18503] CPU: 1 PID: 18503 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 180.378762][T18503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.388817][T18503] Call Trace: [ 180.392164][T18503] dump_stack_lvl+0xb7/0x103 [ 180.396783][T18503] dump_stack+0x11/0x1a [ 180.400946][T18503] should_fail+0x23c/0x250 [ 180.405406][T18503] ? security_inode_alloc+0x30/0x180 [ 180.410701][T18503] __should_failslab+0x81/0x90 [ 180.415473][T18503] should_failslab+0x5/0x20 [ 180.419985][T18503] kmem_cache_alloc+0x46/0x2e0 [ 180.424879][T18503] security_inode_alloc+0x30/0x180 [ 180.430018][T18503] inode_init_always+0x20d/0x440 [ 180.434969][T18503] ? set_qf_name+0x230/0x230 [ 180.439570][T18503] new_inode_pseudo+0x73/0x1c0 [ 180.444354][T18503] new_inode+0x21/0x120 [ 180.448514][T18503] __ext4_new_inode+0x126/0x2f90 [ 180.453533][T18503] ? __dquot_initialize+0x131/0x7e0 [ 180.458802][T18503] ext4_mkdir+0x28a/0x760 [ 180.463227][T18503] vfs_mkdir+0x2c3/0x3e0 [ 180.467712][T18503] do_mkdirat+0x12e/0x2e0 [ 180.472055][T18503] __x64_sys_mkdir+0x40/0x50 [ 180.476694][T18503] do_syscall_64+0x3d/0x90 [ 180.481122][T18503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.487032][T18503] RIP: 0033:0x465707 18:54:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000400000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 180.490926][T18503] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.510542][T18503] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 180.519090][T18503] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 180.520482][T18514] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 180.527067][T18503] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 180.527081][T18503] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff 18:54:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010500, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 180.546463][T18514] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 180.552199][T18503] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 180.552224][T18503] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 180.576245][T18514] System zones: 0-2, 18-18, 34-35 [ 180.576897][T18500] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 180.581689][T18514] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 2: vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100a9, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 180.600596][T18500] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 180.601490][T18514] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 180.619243][T18500] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 180.619271][T18500] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:01 executing program 2: vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011900, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 180.720838][T18552] loop3: detected capacity change from 0 to 264192 [ 180.734316][T18551] loop5: detected capacity change from 0 to 264192 [ 180.763089][T18552] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 180.784528][T18552] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:54:01 executing program 2: vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:01 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 180.802076][T18552] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 180.814467][T18552] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 180.833202][T18551] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 18:54:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 180.874141][T18581] loop1: detected capacity change from 0 to 264192 [ 180.885342][T18581] FAULT_INJECTION: forcing a failure. [ 180.885342][T18581] name failslab, interval 1, probability 0, space 0, times 0 [ 180.897998][T18581] CPU: 0 PID: 18581 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 180.906438][T18581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.912386][T18586] loop0: detected capacity change from 0 to 264192 [ 180.916515][T18581] Call Trace: [ 180.916525][T18581] dump_stack_lvl+0xb7/0x103 [ 180.916550][T18581] dump_stack+0x11/0x1a [ 180.916567][T18581] should_fail+0x23c/0x250 [ 180.937292][T18551] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 180.939500][T18581] ? sidtab_sid2str_get+0x9c/0x130 [ 180.939531][T18581] __should_failslab+0x81/0x90 [ 180.957110][T18551] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 180.962240][T18581] should_failslab+0x5/0x20 [ 180.967035][T18551] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 180.979112][T18581] __kmalloc_track_caller+0x64/0x340 [ 180.979141][T18581] kmemdup+0x21/0x50 [ 181.003367][T18581] sidtab_sid2str_get+0x9c/0x130 [ 181.008324][T18581] security_sid_to_context_core+0x1cb/0x2d0 [ 181.014238][T18581] security_sid_to_context_force+0x2f/0x40 [ 181.020058][T18581] selinux_inode_init_security+0x49e/0x550 [ 181.025908][T18581] security_inode_init_security+0xd7/0x260 [ 181.031736][T18581] ? ext4_init_security+0x40/0x40 [ 181.036775][T18581] ext4_init_security+0x30/0x40 [ 181.041638][T18581] __ext4_new_inode+0x29c2/0x2f90 [ 181.046721][T18581] ext4_mkdir+0x28a/0x760 [ 181.051147][T18581] vfs_mkdir+0x2c3/0x3e0 [ 181.055395][T18581] do_mkdirat+0x12e/0x2e0 [ 181.059829][T18581] __x64_sys_mkdir+0x40/0x50 [ 181.064443][T18581] do_syscall_64+0x3d/0x90 [ 181.069041][T18581] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.074952][T18581] RIP: 0033:0x465707 [ 181.078839][T18581] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.098509][T18581] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 181.106992][T18581] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 181.114953][T18581] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 18:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 181.122943][T18581] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 181.130899][T18581] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 181.138853][T18581] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 181.160058][T18586] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:54:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010600, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 181.179165][T18586] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 181.187360][T18586] System zones: 0-2, 18-18, 34-35 [ 181.193478][T18586] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 181.204596][T18586] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100fe, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011901, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 181.308913][T18624] loop1: detected capacity change from 0 to 264192 [ 181.320787][T18627] loop3: detected capacity change from 0 to 264192 [ 181.335557][T18624] FAULT_INJECTION: forcing a failure. [ 181.335557][T18624] name failslab, interval 1, probability 0, space 0, times 0 [ 181.348237][T18624] CPU: 1 PID: 18624 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 181.356661][T18624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.366718][T18624] Call Trace: [ 181.370005][T18624] dump_stack_lvl+0xb7/0x103 [ 181.374705][T18624] dump_stack+0x11/0x1a [ 181.378881][T18624] should_fail+0x23c/0x250 [ 181.383301][T18624] ? sidtab_sid2str_get+0x9c/0x130 [ 181.388408][T18624] __should_failslab+0x81/0x90 [ 181.393158][T18624] should_failslab+0x5/0x20 [ 181.397724][T18624] __kmalloc_track_caller+0x64/0x340 [ 181.403091][T18624] kmemdup+0x21/0x50 [ 181.407001][T18624] sidtab_sid2str_get+0x9c/0x130 [ 181.412020][T18624] security_sid_to_context_core+0x1cb/0x2d0 [ 181.417944][T18624] security_sid_to_context_force+0x2f/0x40 [ 181.423923][T18624] selinux_inode_init_security+0x49e/0x550 [ 181.429818][T18624] security_inode_init_security+0xd7/0x260 [ 181.435709][T18624] ? ext4_init_security+0x40/0x40 [ 181.440783][T18624] ext4_init_security+0x30/0x40 [ 181.445626][T18624] __ext4_new_inode+0x29c2/0x2f90 [ 181.450650][T18624] ext4_mkdir+0x28a/0x760 [ 181.455072][T18624] vfs_mkdir+0x2c3/0x3e0 [ 181.459315][T18624] do_mkdirat+0x12e/0x2e0 [ 181.463656][T18624] __x64_sys_mkdir+0x40/0x50 [ 181.468297][T18624] do_syscall_64+0x3d/0x90 [ 181.472717][T18624] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.478674][T18624] RIP: 0033:0x465707 [ 181.482558][T18624] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.502365][T18624] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 181.510765][T18624] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 181.518720][T18624] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 181.526699][T18624] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 181.534655][T18624] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 181.542695][T18624] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 181.573295][T18645] loop0: detected capacity change from 0 to 264192 [ 181.581244][T18643] loop5: detected capacity change from 0 to 264192 [ 181.603605][T18643] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 181.613455][T18645] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 181.640740][T18627] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 181.677290][T18643] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 181.678017][T18645] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 181.694959][T18643] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 181.708841][T18627] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:54:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010204, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 181.715281][T18643] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 181.732801][T18627] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 181.755582][T18627] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:02 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010604, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011a01, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 181.809902][T18645] System zones: 0-2, 18-18, 34-35 [ 181.815557][T18645] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 181.826642][T18645] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 181.892938][T18677] loop5: detected capacity change from 0 to 264192 [ 181.896694][T18685] loop1: detected capacity change from 0 to 264192 [ 181.914764][T18685] FAULT_INJECTION: forcing a failure. [ 181.914764][T18685] name failslab, interval 1, probability 0, space 0, times 0 [ 181.927424][T18685] CPU: 0 PID: 18685 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 181.935904][T18685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.946164][T18685] Call Trace: [ 181.949450][T18685] dump_stack_lvl+0xb7/0x103 [ 181.952848][T18677] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 181.954051][T18685] dump_stack+0x11/0x1a [ 181.954074][T18685] should_fail+0x23c/0x250 [ 181.964728][T18677] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 181.967361][T18685] ? __es_insert_extent+0x51f/0xe70 [ 181.967385][T18685] __should_failslab+0x81/0x90 [ 181.967403][T18685] should_failslab+0x5/0x20 [ 181.971828][T18677] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 181.989242][T18685] kmem_cache_alloc+0x46/0x2e0 [ 181.989267][T18685] __es_insert_extent+0x51f/0xe70 [ 181.994484][T18677] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 181.999205][T18685] ? __kmalloc+0x237/0x340 18:54:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010300, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 182.040723][T18685] ? kcalloc+0x32/0x50 [ 182.044848][T18685] ext4_es_insert_extent+0x1bb/0x19d0 [ 182.050375][T18685] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 182.056710][T18685] ext4_ext_map_blocks+0xf89/0x1f10 [ 182.061936][T18685] ? __down_read_common+0x16d/0x530 [ 182.067185][T18685] ? percpu_counter_add_batch+0x69/0xd0 [ 182.072752][T18685] ? ext4_es_lookup_extent+0x206/0x490 [ 182.078265][T18685] ext4_map_blocks+0x1be/0xef0 [ 182.083133][T18685] ext4_getblk+0xb5/0x3d0 [ 182.087469][T18685] ? __ext4_new_inode+0x2b0e/0x2f90 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 182.092742][T18685] ext4_bread+0x28/0x100 [ 182.097009][T18685] ext4_append+0xd1/0x1c0 [ 182.101345][T18685] ext4_init_new_dir+0x177/0x500 [ 182.106289][T18685] ext4_mkdir+0x329/0x760 [ 182.110692][T18685] vfs_mkdir+0x2c3/0x3e0 [ 182.114944][T18685] do_mkdirat+0x12e/0x2e0 [ 182.119462][T18685] __x64_sys_mkdir+0x40/0x50 [ 182.124106][T18685] do_syscall_64+0x3d/0x90 [ 182.128626][T18685] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.134530][T18685] RIP: 0033:0x465707 [ 182.138404][T18685] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.158256][T18685] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 182.166654][T18685] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 182.174612][T18685] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 182.182587][T18685] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 182.190725][T18685] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 182.198793][T18685] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 182.208814][T18685] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 182.218231][T18685] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 182.226468][T18696] loop0: detected capacity change from 0 to 264192 [ 182.242519][T18685] System zones: 0-2, 18-18, 34-35 [ 182.246234][T18724] loop3: detected capacity change from 0 to 264192 [ 182.249375][T18685] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 182.265143][T18685] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 182.276478][T18696] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 182.289007][T18724] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 182.299194][T18696] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 182.303608][T18733] loop5: detected capacity change from 0 to 264192 [ 182.308988][T18724] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 182.314576][T18696] System zones: 0-2, 18-18 [ 182.331195][T18724] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 182.331208][T18696] , 34-35 [ 182.347869][T18724] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010700, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:02 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 182.386997][T18696] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 182.388343][T18733] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 182.398163][T18696] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011a03, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 182.428887][T18733] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 182.446484][T18733] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 182.458676][T18733] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 18:54:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 182.501174][T18761] loop3: detected capacity change from 0 to 264192 [ 182.543267][T18761] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 182.557824][ T25] audit: type=1326 audit(1630695243.099:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18771 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 182.585981][T18772] loop1: detected capacity change from 0 to 264192 18:54:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600fe00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010318, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 182.593231][T18761] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 182.610894][T18761] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 182.623133][T18761] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 182.641575][T18772] FAULT_INJECTION: forcing a failure. [ 182.641575][T18772] name failslab, interval 1, probability 0, space 0, times 0 [ 182.654235][T18772] CPU: 0 PID: 18772 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 182.662662][T18772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.672718][T18772] Call Trace: [ 182.675994][T18772] dump_stack_lvl+0xb7/0x103 [ 182.680649][T18772] dump_stack+0x11/0x1a [ 182.684884][T18772] should_fail+0x23c/0x250 [ 182.689334][T18772] ? kcalloc+0x32/0x50 [ 182.693408][T18772] __should_failslab+0x81/0x90 [ 182.698172][T18772] should_failslab+0x5/0x20 [ 182.702690][T18772] __kmalloc+0x66/0x340 [ 182.706868][T18772] ? kcalloc+0x32/0x50 [ 182.710932][T18772] kcalloc+0x32/0x50 [ 182.714833][T18772] ext4_find_extent+0x21c/0x7f0 [ 182.719758][T18772] ? kfree+0xf0/0x1d0 [ 182.723804][T18772] ext4_ext_map_blocks+0xd9/0x1f10 [ 182.729014][T18772] ? __down_write_common+0x42/0x810 [ 182.734219][T18772] ? __down_read_common+0x16d/0x530 [ 182.735223][T18778] loop0: detected capacity change from 0 to 264192 [ 182.739459][T18772] ? percpu_counter_add_batch+0x69/0xd0 [ 182.751498][T18772] ? ext4_es_lookup_extent+0x206/0x490 [ 182.757113][T18772] ext4_map_blocks+0x70d/0xef0 [ 182.761883][T18772] ext4_getblk+0xb5/0x3d0 [ 182.766230][T18772] ext4_bread+0x28/0x100 [ 182.770535][T18772] ext4_append+0xd1/0x1c0 [ 182.774875][T18772] ext4_init_new_dir+0x177/0x500 [ 182.779831][T18772] ext4_mkdir+0x329/0x760 [ 182.784163][T18772] vfs_mkdir+0x2c3/0x3e0 [ 182.788405][T18772] do_mkdirat+0x12e/0x2e0 [ 182.792738][T18772] __x64_sys_mkdir+0x40/0x50 [ 182.797344][T18772] do_syscall_64+0x3d/0x90 [ 182.801771][T18772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.807673][T18772] RIP: 0033:0x465707 [ 182.811552][T18772] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.831147][T18772] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 18:54:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000402600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 182.839567][T18772] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 182.847599][T18772] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 182.855570][T18772] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 182.863528][T18772] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 182.871515][T18772] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 182.908751][T18778] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 182.939638][T18778] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010900, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 182.958891][ T25] audit: type=1326 audit(1630695243.499:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18792 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 182.959785][T18794] loop5: detected capacity change from 0 to 264192 18:54:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000003600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011b00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 183.007224][T18778] System zones: 0-2, 18-18, 34-35 [ 183.019060][T18778] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 183.030139][T18778] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 183.040105][T18807] loop1: detected capacity change from 0 to 264192 [ 183.068246][T18794] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 183.097359][T18807] FAULT_INJECTION: forcing a failure. [ 183.097359][T18807] name failslab, interval 1, probability 0, space 0, times 0 [ 183.108074][T18818] loop3: detected capacity change from 0 to 264192 18:54:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000204600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 183.110126][T18807] CPU: 0 PID: 18807 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 183.124949][T18807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.135003][T18807] Call Trace: [ 183.138282][T18807] dump_stack_lvl+0xb7/0x103 [ 183.142942][T18807] dump_stack+0x11/0x1a [ 183.147094][T18807] should_fail+0x23c/0x250 [ 183.150553][T18794] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 183.151623][T18807] ? kcalloc+0x32/0x50 [ 183.151643][T18807] __should_failslab+0x81/0x90 [ 183.169219][T18794] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 183.173260][T18807] should_failslab+0x5/0x20 [ 183.173286][T18807] __kmalloc+0x66/0x340 [ 183.173305][T18807] ? kcalloc+0x32/0x50 [ 183.173320][T18807] kcalloc+0x32/0x50 [ 183.173333][T18807] ext4_find_extent+0x21c/0x7f0 [ 183.173350][T18807] ? kfree+0xf0/0x1d0 [ 183.173363][T18807] ext4_ext_map_blocks+0xd9/0x1f10 [ 183.173381][T18807] ? __down_write_common+0x42/0x810 [ 183.178127][T18794] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 183.190256][T18807] ? __down_read_common+0x16d/0x530 [ 183.190280][T18807] ? percpu_counter_add_batch+0x69/0xd0 [ 183.247268][T18807] ? ext4_es_lookup_extent+0x206/0x490 [ 183.252723][T18807] ext4_map_blocks+0x70d/0xef0 [ 183.257536][T18807] ext4_getblk+0xb5/0x3d0 [ 183.261859][T18807] ext4_bread+0x28/0x100 [ 183.266096][T18807] ext4_append+0xd1/0x1c0 [ 183.270424][T18807] ext4_init_new_dir+0x177/0x500 [ 183.275471][T18807] ext4_mkdir+0x329/0x760 [ 183.279891][T18807] vfs_mkdir+0x2c3/0x3e0 [ 183.284184][T18807] do_mkdirat+0x12e/0x2e0 [ 183.288508][T18807] __x64_sys_mkdir+0x40/0x50 [ 183.293127][T18807] do_syscall_64+0x3d/0x90 [ 183.297535][T18807] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.303423][T18807] RIP: 0033:0x465707 [ 183.307335][T18807] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.327327][T18807] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 183.335735][T18807] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 183.343701][T18807] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 183.351659][T18807] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 183.359659][T18807] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 183.367686][T18807] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000604600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010319, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006008004600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 183.413450][T18835] loop0: detected capacity change from 0 to 264192 18:54:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 183.467183][T18835] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 183.486527][T18818] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 183.498263][T18835] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 183.519862][T18835] System zones: 0-2, 18-18, 34-35 [ 183.543284][T18818] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 183.550538][T18835] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 183.561014][T18818] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:54:04 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 183.572157][T18835] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 183.584492][T18818] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 183.626160][T18864] loop5: detected capacity change from 0 to 264192 [ 183.638199][T18864] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 183.647671][T18868] loop1: detected capacity change from 0 to 264192 [ 183.655026][T18864] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 183.655497][T18868] FAULT_INJECTION: forcing a failure. [ 183.655497][T18868] name failslab, interval 1, probability 0, space 0, times 0 [ 183.672574][T18864] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 183.685136][T18868] CPU: 1 PID: 18868 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 183.697283][T18864] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 183.705771][T18868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.726461][T18868] Call Trace: [ 183.729740][T18868] dump_stack_lvl+0xb7/0x103 [ 183.734336][T18868] dump_stack+0x11/0x1a [ 183.738491][T18868] should_fail+0x23c/0x250 [ 183.742954][T18868] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 183.748243][T18868] __should_failslab+0x81/0x90 [ 183.753013][T18868] should_failslab+0x5/0x20 [ 183.757520][T18868] kmem_cache_alloc+0x46/0x2e0 [ 183.762308][T18868] ext4_mb_new_blocks+0x70f/0x1f90 [ 183.767465][T18868] ? ext4_find_extent+0x6cf/0x7f0 [ 183.772500][T18868] ? ext4_ext_search_right+0x300/0x540 [ 183.778018][T18868] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 183.783751][T18868] ext4_ext_map_blocks+0x1579/0x1f10 [ 183.789038][T18868] ? __down_write_common+0x42/0x810 18:54:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010a00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000005600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011b03, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01031a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 183.794298][T18868] ? __down_read_common+0x16d/0x530 [ 183.799509][T18868] ? percpu_counter_add_batch+0x69/0xd0 [ 183.805075][T18868] ? ext4_es_lookup_extent+0x206/0x490 [ 183.810535][T18868] ext4_map_blocks+0x70d/0xef0 [ 183.815372][T18868] ext4_getblk+0xb5/0x3d0 [ 183.819703][T18868] ext4_bread+0x28/0x100 [ 183.824037][T18868] ext4_append+0xd1/0x1c0 [ 183.828383][T18868] ext4_init_new_dir+0x177/0x500 [ 183.833322][T18868] ext4_mkdir+0x329/0x760 [ 183.837731][T18868] vfs_mkdir+0x2c3/0x3e0 [ 183.841995][T18868] do_mkdirat+0x12e/0x2e0 [ 183.846315][T18868] __x64_sys_mkdir+0x40/0x50 [ 183.850898][T18868] do_syscall_64+0x3d/0x90 [ 183.855329][T18868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 183.861248][T18868] RIP: 0033:0x465707 [ 183.865137][T18868] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 183.884894][T18868] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 183.893301][T18868] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 183.901258][T18868] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 183.909216][T18868] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff [ 183.917188][T18868] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 183.925223][T18868] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002f05600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 183.952639][T18886] loop0: detected capacity change from 0 to 264192 [ 183.973270][T18886] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 183.993074][T18886] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:04 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 184.037447][T18897] loop5: detected capacity change from 0 to 264192 [ 184.061064][T18886] System zones: 0-2, 18-18, 34-35 [ 184.066121][T18910] loop1: detected capacity change from 0 to 264192 [ 184.072991][T18912] loop3: detected capacity change from 0 to 264192 [ 184.075689][T18910] FAULT_INJECTION: forcing a failure. 18:54:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 184.075689][T18910] name failslab, interval 1, probability 0, space 0, times 0 [ 184.092536][T18910] CPU: 0 PID: 18910 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 184.101056][T18910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.111254][T18910] Call Trace: [ 184.114529][T18910] dump_stack_lvl+0xb7/0x103 [ 184.119205][T18910] dump_stack+0x11/0x1a [ 184.123705][T18910] should_fail+0x23c/0x250 [ 184.128260][T18910] ? __es_insert_extent+0x51f/0xe70 [ 184.133472][T18910] __should_failslab+0x81/0x90 [ 184.138236][T18910] should_failslab+0x5/0x20 [ 184.142822][T18910] kmem_cache_alloc+0x46/0x2e0 [ 184.148125][T18910] __es_insert_extent+0x51f/0xe70 [ 184.153156][T18910] ? ext4_ext_map_blocks+0x10b8/0x1f10 [ 184.158758][T18910] ext4_es_insert_extent+0x1bb/0x19d0 [ 184.164139][T18910] ? percpu_counter_add_batch+0x69/0xd0 [ 184.169683][T18910] ? ext4_es_lookup_extent+0x206/0x490 [ 184.175197][T18910] ext4_map_blocks+0xa4c/0xef0 [ 184.180020][T18910] ext4_getblk+0xb5/0x3d0 [ 184.184340][T18910] ext4_bread+0x28/0x100 [ 184.188575][T18910] ext4_append+0xd1/0x1c0 [ 184.192894][T18910] ext4_init_new_dir+0x177/0x500 [ 184.198032][T18910] ext4_mkdir+0x329/0x760 [ 184.202453][T18910] vfs_mkdir+0x2c3/0x3e0 [ 184.206898][T18910] do_mkdirat+0x12e/0x2e0 [ 184.211258][T18910] __x64_sys_mkdir+0x40/0x50 [ 184.215837][T18910] do_syscall_64+0x3d/0x90 [ 184.220433][T18910] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.226494][T18910] RIP: 0033:0x465707 [ 184.230374][T18910] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.250855][T18910] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 184.259261][T18910] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 184.267222][T18910] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 184.275268][T18910] RBP: 00007ffa352f4040 R08: 0000000000000000 R09: ffffffffffffffff 18:54:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000006600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 184.283589][T18910] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 184.291560][T18910] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 184.310732][T18897] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 184.326855][T18910] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 184.348081][T18897] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 184.355010][T18886] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 184.365642][T18897] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:54:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @initdev}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 184.376849][T18886] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 184.389254][T18897] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 184.412074][T18910] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 184.420509][T18912] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 184.442032][T18910] System zones: 0-2, 18-18, 34-35 18:54:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000406600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 184.447813][T18912] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 184.465581][T18912] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:54:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010b00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01031b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 184.501210][T18910] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:54:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc012000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000007600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:05 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600c009600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 184.598070][T18957] loop5: detected capacity change from 0 to 264192 18:54:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 184.639598][T18963] loop0: detected capacity change from 0 to 264192 [ 184.647463][T18976] loop1: detected capacity change from 0 to 264192 [ 184.651874][T18957] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 184.666603][T18957] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:54:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600000a600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 184.668455][T18964] loop3: detected capacity change from 0 to 264192 [ 184.684343][T18957] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 184.705814][T18976] FAULT_INJECTION: forcing a failure. [ 184.705814][T18976] name failslab, interval 1, probability 0, space 0, times 0 [ 184.718557][T18976] CPU: 0 PID: 18976 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 184.726971][T18976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.737108][T18976] Call Trace: [ 184.740375][T18976] dump_stack_lvl+0xb7/0x103 [ 184.744959][T18976] dump_stack+0x11/0x1a [ 184.749290][T18976] should_fail+0x23c/0x250 [ 184.753708][T18976] ? __se_sys_mount+0x4e/0x2e0 [ 184.758471][T18976] __should_failslab+0x81/0x90 [ 184.763224][T18976] should_failslab+0x5/0x20 [ 184.767784][T18976] __kmalloc_track_caller+0x64/0x340 [ 184.773077][T18976] ? do_mkdirat+0x2a0/0x2e0 [ 184.777595][T18976] ? strnlen_user+0x137/0x1c0 [ 184.782352][T18976] strndup_user+0x73/0x120 [ 184.786803][T18976] __se_sys_mount+0x4e/0x2e0 [ 184.791383][T18976] ? do_mkdirat+0x2a0/0x2e0 [ 184.795922][T18976] __x64_sys_mount+0x63/0x70 [ 184.800572][T18976] do_syscall_64+0x3d/0x90 [ 184.805006][T18976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.810907][T18976] RIP: 0033:0x467b1a [ 184.814784][T18976] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:54:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010391, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 184.834426][T18976] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 184.842824][T18976] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 184.850778][T18976] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffa352f4000 [ 184.858731][T18976] RBP: 00007ffa352f4040 R08: 00007ffa352f4040 R09: 0000000020000000 [ 184.866744][T18976] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 184.874768][T18976] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 184.914053][T18963] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 184.929237][T18963] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:05 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 184.971640][T18963] System zones: 0-2, 18-18, 34-35 [ 185.006831][T18964] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 185.008042][T19008] loop1: detected capacity change from 0 to 264192 [ 185.016962][T18964] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 185.040252][T18964] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 185.040590][T18963] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 185.077333][T19008] FAULT_INJECTION: forcing a failure. [ 185.077333][T19008] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.090529][T19008] CPU: 0 PID: 19008 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 185.098945][T19008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.101315][T19012] loop5: detected capacity change from 0 to 264192 [ 185.108988][T19008] Call Trace: [ 185.108998][T19008] dump_stack_lvl+0xb7/0x103 [ 185.109022][T19008] dump_stack+0x11/0x1a [ 185.127461][T19008] should_fail+0x23c/0x250 [ 185.131920][T19008] should_fail_usercopy+0x16/0x20 [ 185.137077][T19008] _copy_from_user+0x1c/0xd0 [ 185.141666][T19008] strndup_user+0xb0/0x120 [ 185.146145][T19008] __se_sys_mount+0x4e/0x2e0 [ 185.150805][T19008] __x64_sys_mount+0x63/0x70 [ 185.155464][T19008] do_syscall_64+0x3d/0x90 [ 185.159893][T19008] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.165985][T19008] RIP: 0033:0x467b1a [ 185.169872][T19008] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.189521][T19008] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 185.198121][T19008] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 18:54:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010c00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600000b600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 185.206074][T19008] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffa352f4000 [ 185.214026][T19008] RBP: 00007ffa352f4040 R08: 00007ffa352f4040 R09: 0000000020000000 [ 185.222087][T19008] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 185.230042][T19008] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc012010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000018600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 185.311866][T19031] loop3: detected capacity change from 0 to 264192 [ 185.345368][T19012] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 185.349735][T19041] loop0: detected capacity change from 0 to 264192 18:54:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 185.355689][T19031] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 185.420307][T19051] loop1: detected capacity change from 0 to 264192 [ 185.426475][T19041] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 185.430871][T19012] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 185.453557][T19012] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 185.461571][T19051] FAULT_INJECTION: forcing a failure. [ 185.461571][T19051] name failslab, interval 1, probability 0, space 0, times 0 [ 185.467687][T19031] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 185.478375][T19051] CPU: 1 PID: 19051 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 185.478418][T19051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.478429][T19051] Call Trace: [ 185.478436][T19051] dump_stack_lvl+0xb7/0x103 [ 185.478457][T19051] dump_stack+0x11/0x1a [ 185.496098][T19031] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 185.504463][T19051] should_fail+0x23c/0x250 [ 185.528717][T19041] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 185.538958][T19051] ? __se_sys_mount+0x91/0x2e0 [ 185.538989][T19051] __should_failslab+0x81/0x90 [ 185.539007][T19051] should_failslab+0x5/0x20 [ 185.565377][T19051] __kmalloc_track_caller+0x64/0x340 [ 185.570658][T19051] ? strnlen_user+0x137/0x1c0 [ 185.575329][T19051] strndup_user+0x73/0x120 [ 185.579852][T19051] __se_sys_mount+0x91/0x2e0 [ 185.584435][T19051] __x64_sys_mount+0x63/0x70 [ 185.589019][T19051] do_syscall_64+0x3d/0x90 [ 185.593460][T19051] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.599347][T19051] RIP: 0033:0x467b1a 18:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600001c600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 185.603244][T19051] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.622840][T19051] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 185.631245][T19051] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 185.639208][T19051] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffa352f4000 [ 185.647174][T19051] RBP: 00007ffa352f4040 R08: 00007ffa352f4040 R09: 0000000020000000 [ 185.655129][T19051] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 185.663086][T19051] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 18:54:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010d00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 185.700988][T19041] System zones: 0-2, 18-18, 34-35 [ 185.708628][T19041] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010402, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000020600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc012200, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:06 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000026600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 185.834513][T19091] loop3: detected capacity change from 0 to 264192 [ 185.844302][T19094] loop5: detected capacity change from 0 to 264192 [ 185.874156][T19092] loop0: detected capacity change from 0 to 264192 18:54:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 185.880046][T19103] loop1: detected capacity change from 0 to 264192 [ 185.894134][T19091] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 185.903612][T19094] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 185.935676][T19091] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 185.938144][T19103] FAULT_INJECTION: forcing a failure. [ 185.938144][T19103] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.953379][T19091] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 185.966379][T19103] CPU: 1 PID: 19103 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 185.986903][T19103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.993998][T19094] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 185.996957][T19103] Call Trace: [ 186.014547][T19094] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 186.017776][T19103] dump_stack_lvl+0xb7/0x103 [ 186.034462][T19103] dump_stack+0x11/0x1a [ 186.038625][T19103] should_fail+0x23c/0x250 [ 186.043114][T19103] should_fail_usercopy+0x16/0x20 [ 186.048135][T19103] _copy_from_user+0x1c/0xd0 [ 186.052725][T19103] strndup_user+0xb0/0x120 [ 186.057201][T19103] __se_sys_mount+0x91/0x2e0 [ 186.061789][T19103] __x64_sys_mount+0x63/0x70 [ 186.066466][T19103] do_syscall_64+0x3d/0x90 [ 186.070873][T19103] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.076759][T19103] RIP: 0033:0x467b1a [ 186.080674][T19103] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.100267][T19103] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 186.108662][T19103] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 186.116619][T19103] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffa352f4000 [ 186.124617][T19103] RBP: 00007ffa352f4040 R08: 00007ffa352f4040 R09: 0000000020000000 18:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600052f600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 186.132744][T19103] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 186.140894][T19103] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 186.154030][T19092] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 186.180252][T19092] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 186.188621][ T1041] ================================================================== [ 186.196703][ T1041] BUG: KCSAN: data-race in __dentry_kill / vfs_unlink [ 186.203452][ T1041] [ 186.205760][ T1041] write to 0xffff8881344a1840 of 4 bytes by task 19068 on cpu 1: [ 186.213485][ T1041] vfs_unlink+0x279/0x470 [ 186.217811][ T1041] do_unlinkat+0x248/0x520 [ 186.222211][ T1041] __x64_sys_unlink+0x2c/0x30 [ 186.226890][ T1041] do_syscall_64+0x3d/0x90 [ 186.231287][ T1041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.237164][ T1041] [ 186.239469][ T1041] read to 0xffff8881344a1840 of 4 bytes by task 1041 on cpu 0: [ 186.246996][ T1041] __dentry_kill+0x1ef/0x4e0 [ 186.251562][ T1041] dput+0xc6/0x360 [ 186.255258][ T1041] step_into+0x463/0xee0 [ 186.259517][ T1041] walk_component+0x190/0x350 [ 186.264184][ T1041] path_lookupat+0x12d/0x3d0 [ 186.268758][ T1041] __filename_lookup+0x11b/0x300 [ 186.273704][ T1041] user_path_at_empty+0x3e/0x110 [ 186.278758][ T1041] do_readlinkat+0x87/0x200 [ 186.283249][ T1041] __x64_sys_readlink+0x43/0x50 [ 186.288087][ T1041] do_syscall_64+0x3d/0x90 [ 186.292508][ T1041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.298394][ T1041] [ 186.300743][ T1041] value changed: 0x00600008 -> 0x00000008 [ 186.306444][ T1041] [ 186.308807][ T1041] Reported by Kernel Concurrency Sanitizer on: [ 186.314931][ T1041] CPU: 0 PID: 1041 Comm: systemd-udevd Not tainted 5.14.0-syzkaller #0 [ 186.323152][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:54:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010406, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600003f600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010e00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 186.333198][ T1041] ================================================================== [ 186.351782][T19092] System zones: 0-2, 18-18, 34-35 [ 186.361531][T19092] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc012500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000040600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010410, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 186.444985][T19142] loop1: detected capacity change from 0 to 264192 [ 186.460078][T19142] FAULT_INJECTION: forcing a failure. [ 186.460078][T19142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 186.473371][T19142] CPU: 0 PID: 19142 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 186.481786][T19142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.492286][T19142] Call Trace: [ 186.495560][T19142] dump_stack_lvl+0xb7/0x103 [ 186.500154][T19142] dump_stack+0x11/0x1a [ 186.504321][T19142] should_fail+0x23c/0x250 [ 186.508777][T19142] should_fail_usercopy+0x16/0x20 [ 186.513801][T19142] _copy_from_user+0x1c/0xd0 [ 186.518411][T19142] strndup_user+0xb0/0x120 [ 186.522828][T19142] __se_sys_mount+0x91/0x2e0 [ 186.527507][T19142] ? do_mkdirat+0x2a0/0x2e0 [ 186.532040][T19142] __x64_sys_mount+0x63/0x70 [ 186.536632][T19142] do_syscall_64+0x3d/0x90 [ 186.541048][T19142] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 186.546996][T19142] RIP: 0033:0x467b1a [ 186.550874][T19142] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.570577][T19142] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 186.578987][T19142] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 186.586947][T19142] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffa352f4000 18:54:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010f00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 186.594908][T19142] RBP: 00007ffa352f4040 R08: 00007ffa352f4040 R09: 0000000020000000 [ 186.602968][T19142] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 186.611097][T19142] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 186.653088][T19164] loop3: detected capacity change from 0 to 264192 [ 186.660433][T19165] loop0: detected capacity change from 0 to 264192 18:54:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000480600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 186.697727][T19173] loop5: detected capacity change from 0 to 264192 [ 186.698118][T19165] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 186.714057][T19164] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 186.757181][T19164] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 186.774756][T19164] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:54:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 186.803099][T19165] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 186.808112][T19173] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 186.829181][T19173] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:54:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060009c0600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010500, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600fffe600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 186.846723][T19173] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 186.876133][T19165] System zones: 0-2, 18-18, 34-35 18:54:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc012e00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011004, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600feff600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 186.921337][T19165] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 186.957976][T19208] loop1: detected capacity change from 0 to 264192 [ 186.999576][T19208] FAULT_INJECTION: forcing a failure. [ 186.999576][T19208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 186.999899][T19219] loop5: detected capacity change from 0 to 264192 [ 187.013016][T19208] CPU: 0 PID: 19208 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 187.027910][T19208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.037959][T19208] Call Trace: [ 187.041241][T19208] dump_stack_lvl+0xb7/0x103 [ 187.045820][T19208] dump_stack+0x11/0x1a [ 187.049959][T19208] should_fail+0x23c/0x250 [ 187.054400][T19208] should_fail_usercopy+0x16/0x20 [ 187.059409][T19208] _copy_from_user+0x1c/0xd0 [ 187.063994][T19208] __se_sys_mount+0x115/0x2e0 [ 187.068669][T19208] __x64_sys_mount+0x63/0x70 [ 187.073266][T19208] do_syscall_64+0x3d/0x90 [ 187.077675][T19208] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 187.083565][T19208] RIP: 0033:0x467b1a [ 187.087443][T19208] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 187.107036][T19208] RSP: 002b:00007ffa352f3fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 187.115483][T19208] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 187.123440][T19208] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffa352f4000 [ 187.131483][T19208] RBP: 00007ffa352f4040 R08: 00007ffa352f4040 R09: 0000000020000000 [ 187.140566][T19208] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 187.148584][T19208] R13: 0000000020000100 R14: 00007ffa352f4000 R15: 00000000200000c0 [ 187.170601][T19224] loop3: detected capacity change from 0 to 264192 18:54:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600ffff800000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 187.193927][T19208] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 187.204716][T19224] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 187.218117][T19240] loop0: detected capacity change from 0 to 264192 [ 187.221827][T19208] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 187.225632][T19224] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 187.250211][T19224] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 187.270216][T19208] System zones: 0-2, 18-18, 34-35 [ 187.276846][T19208] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:54:07 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 187.302354][T19219] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 187.322587][T19240] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:54:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011020, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 187.354353][T19219] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 187.371981][T19219] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 187.387116][T19240] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010600, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600ffffc00000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc013f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 187.400796][T19240] System zones: 0-2, 18-18, 34-35 [ 187.406459][T19240] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 187.494619][T19269] loop5: detected capacity change from 0 to 264192 [ 187.505123][T19277] loop1: detected capacity change from 0 to 264192 [ 187.510463][T19278] loop3: detected capacity change from 0 to 264192 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000200000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 187.536133][T19285] loop0: detected capacity change from 0 to 264192 [ 187.564656][T19269] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 187.593233][T19285] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 187.616044][T19269] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 187.620715][T19285] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc014000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 187.633874][T19269] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 187.641925][T19285] System zones: 0-2, 18-18, 34-35 [ 187.660620][T19285] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 187.713636][T19278] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 187.722935][T19277] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 187.734695][T19277] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 187.743176][T19278] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 187.760720][T19278] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 187.778556][T19315] loop0: detected capacity change from 0 to 264192 [ 187.778754][T19277] System zones: 0-2, 18-18, 34-35 [ 187.793601][T19277] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 187.796584][T19315] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:54:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011100, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000400000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 187.833825][T19315] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 187.856880][T19315] System zones: 0-2, 18-18, 34-35 [ 187.872877][T19315] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010604, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc014800, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000002600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 187.950745][T19338] loop5: detected capacity change from 0 to 264192 [ 187.964198][T19331] loop3: detected capacity change from 0 to 264192 [ 187.980937][T19338] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 187.996348][T19331] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 188.015236][T19331] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 188.032927][T19331] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 188.046112][T19338] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 188.063805][T19338] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 188.081168][T19354] loop1: detected capacity change from 0 to 264192 [ 188.096536][T19365] loop0: detected capacity change from 0 to 264192 [ 188.103560][T19354] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 188.134686][T19354] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000003600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 188.147120][T19354] System zones: 0-2, 18-18, 34-35 [ 188.162265][T19365] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 188.176212][T19354] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 188.191870][T19365] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010700, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011200, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc014c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 188.200137][T19365] System zones: 0-2, 18-18, 34-35 [ 188.205747][T19365] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000004600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000005600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 188.320397][T19397] loop5: detected capacity change from 0 to 264192 [ 188.333451][T19405] loop0: detected capacity change from 0 to 264192 [ 188.335446][T19407] loop1: detected capacity change from 0 to 264192 [ 188.352557][T19411] loop3: detected capacity change from 0 to 264192 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 188.364006][T19397] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 188.379046][T19405] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 188.406702][T19411] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 188.422986][T19397] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 188.427820][T19405] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 188.440592][T19397] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 188.460534][T19411] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 188.478455][T19411] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 188.490995][T19407] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010900, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000006600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 188.545681][T19407] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011300, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 188.591921][T19407] System zones: 0-2, 18-18, 34-35 [ 188.599946][T19405] System zones: 0-2, 18-18, 34-35 [ 188.603393][T19407] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 188.606413][T19405] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000007600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc016000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 188.712674][T19449] loop5: detected capacity change from 0 to 264192 [ 188.729385][T19461] loop3: detected capacity change from 0 to 264192 [ 188.741309][T19449] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 188.748867][T19469] loop0: detected capacity change from 0 to 264192 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000008600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 188.772915][T19449] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 188.790609][T19449] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) [ 188.813116][T19461] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 188.835694][T19469] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 18:54:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010a00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 188.889578][T19469] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 188.896975][T19480] loop1: detected capacity change from 0 to 264192 [ 188.908338][T19461] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 188.925904][T19461] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 188.940015][T19469] System zones: 0-2, 18-18, 34-35 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600000a600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 188.980893][T19501] loop5: detected capacity change from 0 to 264192 [ 188.985389][T19469] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 188.998955][T19480] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 189.022864][T19480] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) [ 189.035055][T19480] System zones: 0-2, 18-18, 34-35 [ 189.040168][T19501] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 189.055071][T19501] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 189.072624][T19501] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:54:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011400, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc016300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600000b600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() tkill(0x0, 0x34) [ 189.085942][T19480] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 18:54:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010b00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() tkill(0x0, 0x0) [ 189.184383][T19530] loop0: detected capacity change from 0 to 264192 [ 189.199658][T19529] loop1: detected capacity change from 0 to 264192 [ 189.214086][T19530] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 189.226131][T19543] loop3: detected capacity change from 0 to 264192 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000018600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 189.312959][T19530] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 189.323059][T19529] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 189.329016][T19543] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 189.337940][T19530] System zones: 0-2, 18-18, 34-35 [ 189.351758][T19530] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 189.364335][T19529] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 189.372329][T19529] System zones: 0-2, 18-18, 34-35 [ 189.377890][T19529] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 189.393009][T19559] loop5: detected capacity change from 0 to 264192 18:54:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600001c600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 18:54:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 189.404300][T19543] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 189.421919][T19543] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 189.472868][T19559] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011500, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc016800, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000026600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 189.534027][T19587] loop1: detected capacity change from 0 to 264192 [ 189.551408][T19559] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 189.569033][T19559] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) gettid() 18:54:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010c00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000fe600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 189.590952][T19587] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) [ 189.641744][T19598] loop0: detected capacity change from 0 to 264192 [ 189.662819][T19587] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 189.684996][T19614] loop3: detected capacity change from 0 to 264192 [ 189.693696][T19598] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 189.699393][T19587] System zones: 0-2, 18-18, 34-35 [ 189.709693][T19587] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 189.729036][T19614] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000600000080ffff000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 189.739494][T19598] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 189.761465][T19624] loop5: detected capacity change from 0 to 264192 [ 189.768306][T19598] System zones: 0-2, 18-18, 34-35 [ 189.771645][T19614] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 18:54:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) [ 189.777208][T19598] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 189.790955][T19614] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 189.825736][T19624] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc016c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(0x0, 0x40) 18:54:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011600, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) [ 189.837701][T19624] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 189.855546][T19624] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000c0ffff000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010d00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) [ 189.906615][T19642] loop1: detected capacity change from 0 to 264192 [ 189.931816][T19642] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) [ 189.976362][T19642] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] [ 189.981932][T19663] loop3: detected capacity change from 0 to 264192 [ 190.005666][T19662] loop0: detected capacity change from 0 to 264192 [ 190.007827][T19663] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000100000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 190.023359][T19642] System zones: 0-2, 18-18, 34-35 [ 190.031550][T19642] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 1586790936 [ 190.043394][T19672] loop5: detected capacity change from 0 to 264192 [ 190.050037][T19662] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 190.068676][T19662] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e018, mo2=0002] 18:54:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) [ 190.073302][T19672] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 190.077553][T19662] System zones: 0-2, 18-18, 34-35 [ 190.110858][T19663] EXT4-fs error (device loop3): ext4_ext_check_inode:460: inode #16: comm syz-executor.3: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 190.120177][T19672] EXT4-fs error (device loop5): ext4_ext_check_inode:460: inode #16: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 190.128502][T19663] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 190.145970][T19672] EXT4-fs error (device loop5): ext4_orphan_get:1398: comm syz-executor.5: couldn't read orphan inode 16 (err -117) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600200000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 190.189265][T19662] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 1586790936 [ 190.225825][T19696] loop1: detected capacity change from 0 to 264192 18:54:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc017200, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc011700, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x22a, 0x11580}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600300000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000040)="00100000000800001882945e1d9bd56d61780a0444827da72f52d75d0a7cb8da39", 0x21, 0x4e0}], 0x0, &(0x7f00000000c0)) 18:54:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) [ 190.292162][T19696] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended 18:54:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010e00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000008000010", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f465