0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_setlink={0x34, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x4, 0x0, 0x1, {0xc, 0x3, 0x0, 0x1, [{0x8, 0x1}]}}]}]}, 0x34}}, 0x0) 01:43:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = syz_mount_image$nfs(&(0x7f0000000180)='nfs\x00', &(0x7f0000000200)='./bus\x00', 0x40, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000240)="20896308224d1b05d4311e297a13ded9d565b122a1486874fbc12fb741aa08c8388c15f8dd90271357afbd44d479515c68f31efa2d044fbed915af09afc6721dc8e8c90871773164b1856195236dd685fedf00fd1e753228cfec9247125bef8d28c5963dbdb5335cf1b616ecb7fc24dc8b00978953292ebdae620add15fbecd2a236dff28b4dc38f7c7b5e88c56e0dd736e4b9f6e6addd6128ca9ccf3841d9cba9caa87ea41591365e5a8c565fa561364b40f915b1976d96d2b71a9bad67c8e62f1cf38ed013436842976e671ae9c472e8ff23534d0cc2254c6d", 0xda, 0x4}, {&(0x7f0000000340)="08e119250bf7a657f969893fc9cd6ea4302996aec149f889121a622e07809c310ba9eabbaa56694ff248bbdccf550c6b07f0f6403667144f1096b1951142e4ebebe64550456b9d300c4abc859616136a23b51982678741d782e6fb9ca2321a5b10ed0795975552f6a04e897d643894c4aebcaa8d1df0e88cbe61", 0x7a, 0x40}, {&(0x7f00000003c0)="cb734287df5db6868e14ade64ada04112fb76c0738e0aaa02ff4fd2e4fc07dc93928c0bbd10ae88ed76f6ebef65ad19a2af5c84403356376139f4b618d52f85226850210d00589a286519bf1c16a4d04cbab6d830ac3c014731ad804e5eec00fa1868bbcf32587bbf66c7f263a2b4572e19582d44b2d697cd3ca31e2d8120fb3722387d73e4d8dd5ac93c526b9be741da6812cf56183d7f0adfaeaac754a7e16a1c629ca0d7c433f45754314835c654a58e1f0809c51fbc7ff1df2a88bbe1106fab7986da1f17ffe872a3bbe6dccddd288eb3deb700992e01fb9b4211653", 0xde, 0x7fffffff}, {&(0x7f00000004c0)="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", 0xfc0}], 0x4000, &(0x7f0000001640)=ANY=[@ANYBLOB="2c215b2b5e00000080ffffffff5c272c61707093616973655f747970653d696d617369672c7569643d643138ce3792276d0b95d986ec7bcfb2fb252259d64403a5c328cd692ee3f809c66020642f7db7063341cd183b319abdf9cf5e688fec6bd29565946aaaf04eb26d1c31b29bf50e263af0b7c31b13d4f2523dd0d75edc8b00"/154, @ANYRESDEC, @ANYBLOB=',uid>', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) fcntl$setlease(r3, 0x400, 0x1) fallocate(r1, 0x1, 0x6, 0x100000001) fcntl$notify(r0, 0x402, 0xc) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x1a0) 01:43:46 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000180)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000080)='x', 0x1}], 0x1}, 0x840) 01:43:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_setlink={0x34, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x4, 0x0, 0x1, {0xc, 0x3, 0x0, 0x1, [{0x8, 0x1}]}}]}]}, 0x34}}, 0x0) [ 358.888155][T23896] usb usb3: usbfs: process 23896 (syz-executor.4) did not claim interface 0 before use 01:43:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @l2={'eth', 0x3a, 'ipvlan1\x00'}}]}]}, 0x28}}, 0x0) 01:43:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) read$FUSE(r0, &(0x7f0000004680)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r3, {0x7, 0x21, 0x0, 0x0, 0xffff, 0x8001}}, 0x50) [ 358.970375][T23904] usb usb3: usbfs: process 23904 (syz-executor.4) did not claim interface 0 before use [ 358.983796][T23900] loop3: detected capacity change from 0 to 264192 01:43:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_setlink={0x34, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x4, 0x0, 0x1, {0xc, 0x3, 0x0, 0x1, [{0x8, 0x1}]}}]}]}, 0x34}}, 0x0) 01:43:46 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f00000000c0)={0x40f0f000, 0x0, "397cfa316351e45c50dceab01022fd8015b2eb523f830dae970f22b0a51e87f0"}) [ 359.066229][T23900] nfs: Unknown parameter '![+^' 01:43:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0xb07, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 01:43:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bbff02cc6509f63760ce07f12c2baf577e6f0503c9ca91e9a868377ce200000000000000000093d5b8c2fc097cff1e2a274692fc903c2b54706c05e4cb6e287510768b1d4ebcea424bbeb1222c", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 01:43:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x48, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x14, 0x2, [@TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x48}}, 0x0) 01:43:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0xb07, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 01:43:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_setlink={0x34, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x4, 0x0, 0x1, {0xc, 0x3, 0x0, 0x1, [{0x8, 0x1}]}}]}]}, 0x34}}, 0x0) [ 359.232080][T23936] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:43:47 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x8, @pix_mp}) 01:43:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0xb07, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 01:43:47 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0x10, 0x0}, 0x0) close(r0) 01:43:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bbff02cc6509f63760ce07f12c2baf577e6f0503c9ca91e9a868377ce200000000000000000093d5b8c2fc097cff1e2a274692fc903c2b54706c05e4cb6e287510768b1d4ebcea424bbeb1222c", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 01:43:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="d2", 0x1}], 0x1, &(0x7f0000000200)=[@sndinfo={0x20, 0x84, 0x2, {0xb}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x48, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x14, 0x2, [@TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x48}}, 0x0) 01:43:47 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x8, @pix_mp}) 01:43:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bbff02cc6509f63760ce07f12c2baf577e6f0503c9ca91e9a868377ce200000000000000000093d5b8c2fc097cff1e2a274692fc903c2b54706c05e4cb6e287510768b1d4ebcea424bbeb1222c", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 01:43:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bbff02cc6509f63760ce07f12c2baf577e6f0503c9ca91e9a868377ce200000000000000000093d5b8c2fc097cff1e2a274692fc903c2b54706c05e4cb6e287510768b1d4ebcea424bbeb1222c", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 01:43:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 01:43:47 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x8, @pix_mp}) 01:43:47 executing program 5: unshare(0x40600) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0xc08c5102, &(0x7f0000000040)=@s={0x5, @generic}) 01:43:47 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x8, @pix_mp}) [ 359.742499][T23982] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 359.921535][T23962] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 360.033697][ T3097] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.215297][ T3097] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.398789][ T3097] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.541403][ T3097] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.093514][ T3097] device hsr_slave_0 left promiscuous mode [ 362.104466][ T3097] device hsr_slave_1 left promiscuous mode [ 362.115441][ T3097] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 362.124661][ T3097] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 362.132592][ T3097] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 362.141644][ T3097] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 362.150471][ T3097] device bridge_slave_1 left promiscuous mode [ 362.156584][ T3097] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.166018][ T3097] device bridge_slave_0 left promiscuous mode [ 362.172733][ T3097] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.184029][ T3097] device veth1_macvtap left promiscuous mode [ 362.190258][ T3097] device veth0_macvtap left promiscuous mode [ 362.196258][ T3097] device veth1_vlan left promiscuous mode [ 362.203647][ T3097] device veth0_vlan left promiscuous mode [ 363.589284][ T3097] bond4 (unregistering): Released all slaves [ 363.600449][ T3097] bond3 (unregistering): Released all slaves [ 363.609521][ T3097] bond2 (unregistering): Released all slaves [ 363.617724][ T3097] bond1 (unregistering): Released all slaves [ 363.660179][ T3097] team0 (unregistering): Port device team_slave_1 removed [ 363.670139][ T3097] team0 (unregistering): Port device team_slave_0 removed [ 363.681934][ T3097] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 363.693360][ T3097] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 363.726537][ T3097] bond0 (unregistering): Released all slaves [ 363.961416][T24044] IPVS: ftp: loaded support on port[0] = 21 [ 364.052175][T24044] chnl_net:caif_netlink_parms(): no params data found [ 364.107822][T24044] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.131882][T24044] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.148516][T24044] device bridge_slave_0 entered promiscuous mode [ 364.165425][T24044] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.188057][T24044] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.195824][T24044] device bridge_slave_1 entered promiscuous mode [ 364.243986][T24044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 364.255213][T24044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 364.275584][T24044] team0: Port device team_slave_0 added [ 364.299694][T24044] team0: Port device team_slave_1 added [ 364.330934][T24044] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 364.337889][T24044] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 364.367302][T24044] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 364.379884][T24044] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 364.386877][T24044] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 364.413386][T24044] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 364.440035][T24044] device hsr_slave_0 entered promiscuous mode [ 364.446889][T24044] device hsr_slave_1 entered promiscuous mode [ 364.454829][T24044] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 364.463257][T24044] Cannot create hsr debugfs directory [ 364.505799][T24044] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.512864][T24044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.520117][T24044] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.527294][T24044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.565501][T24044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.578126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.587613][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.595654][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.609102][T24044] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.620132][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.628746][ T8880] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.635780][ T8880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.659572][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.667744][ T8880] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.674806][ T8880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.683957][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.692843][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 364.706403][T24044] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 364.716920][T24044] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 364.729378][ T9704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 364.737394][ T9704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.746096][ T9704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.765998][T24044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 364.774999][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 364.783107][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 364.795273][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 364.830366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.839438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.858813][T24044] device veth0_vlan entered promiscuous mode [ 364.865603][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 364.874913][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.887115][T24044] device veth1_vlan entered promiscuous mode [ 364.894974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.903369][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.911115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 364.930653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 364.939426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.947789][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.957851][T24044] device veth0_macvtap entered promiscuous mode [ 364.967516][T24044] device veth1_macvtap entered promiscuous mode [ 364.986836][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.997711][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.008489][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.019611][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.029621][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.040437][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.050473][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.061248][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.071303][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.082093][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.093238][T24044] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 365.103135][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 365.112165][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.122034][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.130795][ T3866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.142274][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.156173][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.166391][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.177508][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.187699][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.198532][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.208594][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.219691][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.231970][T24044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.243034][T24044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.254581][T24044] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 365.265079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.274684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 365.321956][ T3097] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 365.335865][ T3097] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 365.359697][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 365.378205][ T3097] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 365.388697][ T3097] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 365.396189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 01:43:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0xb07, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 01:43:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) 01:43:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x3ff, 0x4) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="5800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000002800020000000000040000000000000000010000ffffffff000000000c000400feffffff"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503460065583e0000000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x50, 0x0, 0x0, 0x0) 01:43:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000008f80)=[{{0x0, 0x0, &(0x7f0000001000)=[{0x0}, {0x0}, {&(0x7f0000000b40)='4', 0x33fe0}], 0x3}}], 0x1, 0x0) 01:43:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x48, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x14, 0x2, [@TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x48}}, 0x0) 01:43:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 01:43:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 01:43:53 executing program 5: unshare(0x40000000) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000040)={0x1, 0x0, &(0x7f0000000000)=[0x0]}) [ 365.534204][T24286] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 365.565315][T24287] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:43:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x170, r1, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdb, 0x5d}}}}, [@NL80211_ATTR_SCAN_SUPP_RATES={0xe4, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xdd, 0x0, "3a5de2918c375cec7073d02f2e44dd70470bbb5847c0477f4281d38ee115292ab7907dd9e86c4f064306173d7f9d46e753ec2cb0177fefc3fc62133175b271f01282d2464cdc745d00211295f5198325431f0c41ecb1286252674de3d32aecc01970f1296fa34278c71caedb957ee78fcebbeac64b69acb921b2ebd3629725573dbe15315acecf60634dfc28d5ecf7b3120cf22be0e4d92813461b3fe83abe7cfd6bc6b60a632b12889da5bff2feec02420755b167a88021cad6bac236655ea5d59c073d2692debe371fa1390d5b2fdd43cf16086dbd18cb91"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x48, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8, 0x0, 0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x2c, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8, 0x1, 0x3}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x7}, @NL80211_BAND_60GHZ={0x8}, @NL80211_BAND_6GHZ={0x8, 0x3, 0x9}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x8001}]}]}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x2, 0x2}}, @NL80211_ATTR_SCAN_FREQUENCIES={0xc, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x8f6}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x24000811}, 0x40004) socket$inet_udplite(0x2, 0x2, 0x88) 01:43:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x48, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x14, 0x2, [@TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x48}}, 0x0) [ 365.614496][T24286] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 365.626024][T24303] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 365.691474][T24305] IPVS: ftp: loaded support on port[0] = 21 [ 365.727972][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 01:43:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x3ff, 0x4) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="5800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000002800020000000000040000000000000000010000ffffffff000000000c000400feffffff"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503460065583e0000000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x50, 0x0, 0x0, 0x0) [ 365.735956][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 365.766837][T24314] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 365.859903][T24316] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:43:53 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000200)=ANY=[@ANYBLOB='\t\x00\x00\x00 ']) 01:43:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x3ff, 0x4) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="5800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000002800020000000000040000000000000000010000ffffffff000000000c000400feffffff"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503460065583e0000000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x50, 0x0, 0x0, 0x0) 01:43:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) unshare(0x400) setsockopt$packet_fanout(r0, 0x107, 0x8, 0x0, 0x0) [ 365.982457][T24305] IPVS: ftp: loaded support on port[0] = 21 [ 366.008334][ T9704] Bluetooth: hci4: command 0x0409 tx timeout 01:43:53 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82000219) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:43:53 executing program 2: move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0xffffffffffffffff, 0x0) [ 366.070345][T24362] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:43:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x3ff, 0x4) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="5800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000002800020000000000040000000000000000010000ffffffff000000000c000400feffffff"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503460065583e0000000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x50, 0x0, 0x0, 0x0) 01:43:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) [ 366.268368][T24386] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:43:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 01:43:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040a46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 01:43:54 executing program 2: syz_emit_ethernet(0xe81, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80101, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'decodes', ' ', 'io+mem'}, 0xf) 01:43:54 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0xc008ae88, &(0x7f0000001a40)={"05000000dd245c8476010000c9c8dc1964325fa96fa42b76120000002bec0ba41f0100003a40c8a4980000403b00041f01000000003c5ca2c2000000ee377abaece6b88378e3d63a21000040361d264ffa8b46485f02baee450300004252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525a72f44500a1f0db500800000000000008f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa006a832d309fcda5bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478fbe65449b404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e69aff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684364673dcfa9235ea5a2ff23c4bb5c5acb2e8976dcac779ff000000000000003d4e185afe28b774b99d38c90937428617de4cdd6f53c419ce31054182fd898af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e9605ab8c3c43840abd17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba16f70f558b2246ad95ccf7d3f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3efb254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f47692613e28387e955722908dd88b56163be8312ff47c5b6f070072975af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047666865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffb7e7603970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) 01:43:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 01:43:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x44357, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000100)={0x0, 0x0, 0x3f}) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) pipe2(&(0x7f00000001c0), 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) [ 367.182443][T24423] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 367.201781][T24425] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 01:43:54 executing program 1: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x1]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x132a00}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:43:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1}], 0x1c) [ 367.234046][T24434] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem 01:43:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x100, r2, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x8c}, 0x16, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) sendto$packet(r4, &(0x7f0000000040)="d73972c3aeb59ffd33f0b1ac7cac01ef88ca", 0x12, 0x0, &(0x7f0000000100)={0x11, 0x8100, r5}, 0x14) 01:43:55 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:43:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sched_setparam(0x0, &(0x7f00000000c0)=0xa0) sched_getscheduler(r0) setpriority(0x0, r0, 0x3f) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r2 = fanotify_init(0x0, 0x1000) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000240)=""/135, 0x87}], 0x1) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000380), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 01:43:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x10000) fstat(r1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = syz_usb_connect(0x0, 0x4a, &(0x7f0000000500)=ANY=[@ANYBLOB="120100005520f010402038b1420104000001090238000100000000090400000371055900090582ef10000000010200090502"], 0x0) syz_usb_control_io$printer(r2, &(0x7f0000000140)={0x14, 0x0, &(0x7f0000000180)={0x0, 0x3, 0xd7, @string={0xd7, 0x3, "3194c26d03af35da1458288cb229e8fb7467be8096052a4738af8293ede1e1cdf79cca34146f515dc23b8439b5ee1ef1a6055b7849aaaf0b5fc37ac0e7365b95bb868321480c303a5b1eaf411c96fe21c85ba64a8e1ae98e0c8e8851883309c6236122a07ab73258f7e6af0cb11345695c09a7b9b5d2ec26a4ce22000c834c3d59578a00eace7a35300beacf5d9725bb6d837a2a6f40de98ac659d391a579931a8e4728438671660711b2d0bbd0f6f2a1fa3c3a15921c147e258eee0c3f8c756a31000fd0ffab52109bdc39d0f2d526fba52bc4c8f"}}}, 0x0) syz_usb_ep_write$ath9k_ep1(r2, 0x82, 0x88, &(0x7f00000009c0)=ANY=[@ANYBLOB="6e32ecab44e9564fa0522d0ea25edfc652d126b296"]) [ 367.559504][T24457] loop5: detected capacity change from 0 to 8 [ 367.595891][T24459] IPVS: ftp: loaded support on port[0] = 21 [ 367.608364][T24457] MINIX-fs: bad superblock or unable to read bitmaps [ 367.728044][T24457] loop5: detected capacity change from 0 to 8 [ 367.738383][T24457] MINIX-fs: bad superblock or unable to read bitmaps 01:43:55 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 367.848425][ T8880] usb 3-1: new high-speed USB device number 19 using dummy_hcd [ 367.900304][T24490] loop5: detected capacity change from 0 to 8 [ 367.918002][T24490] MINIX-fs: bad superblock or unable to read bitmaps 01:43:55 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 368.088176][ T9704] Bluetooth: hci4: command 0x041b tx timeout [ 368.098003][ T8880] usb 3-1: Using ep0 maxpacket: 16 [ 368.122058][T24498] loop5: detected capacity change from 0 to 8 [ 368.131304][T24498] MINIX-fs: bad superblock or unable to read bitmaps 01:43:55 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 368.228280][ T8880] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 368.241225][T24506] loop5: detected capacity change from 0 to 8 [ 368.248482][ T8880] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 368.254293][T24506] MINIX-fs: bad superblock or unable to read bitmaps [ 368.299968][ T8880] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 01:43:56 executing program 5: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 368.347983][ T8880] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 368.375759][ T8880] usb 3-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 368.431741][T24514] loop5: detected capacity change from 0 to 8 01:43:56 executing program 5: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 368.488442][ T8880] usb 3-1: New USB device found, idVendor=2040, idProduct=b138, bcdDevice= 1.42 [ 368.497559][ T8880] usb 3-1: New USB device strings: Mfr=4, Product=0, SerialNumber=0 [ 368.574982][ T8880] usb 3-1: Manufacturer: syz [ 368.591250][ T8880] usb 3-1: config 0 descriptor?? [ 368.601215][T24459] IPVS: ftp: loaded support on port[0] = 21 [ 368.654168][T24523] loop5: detected capacity change from 0 to 8 01:43:56 executing program 5: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 368.784355][T24550] loop5: detected capacity change from 0 to 8 01:43:56 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 368.949907][ T8880] rc_core: IR keymap rc-hauppauge not found [ 368.955866][ T8880] Registered IR keymap rc-empty [ 368.961709][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 368.968186][T24557] loop5: detected capacity change from 0 to 8 01:43:56 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 369.017985][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.048438][ T8880] rc rc0: Conexant Hybrid TV (cx231xx) MCE IR no TX (2040:b138) as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 01:43:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sched_setparam(0x0, &(0x7f00000000c0)=0xa0) sched_getscheduler(r0) setpriority(0x0, r0, 0x3f) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r2 = fanotify_init(0x0, 0x1000) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000240)=""/135, 0x87}], 0x1) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000380), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 369.085946][ T8880] input: Conexant Hybrid TV (cx231xx) MCE IR no TX (2040:b138) as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input42 [ 369.086926][T24563] loop5: detected capacity change from 0 to 8 01:43:56 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 369.196206][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.196777][T24569] IPVS: ftp: loaded support on port[0] = 21 [ 369.231619][T24573] loop5: detected capacity change from 0 to 8 [ 369.237985][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 01:43:56 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 369.289671][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.318719][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.378009][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.407988][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.449825][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.488156][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.518267][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.558008][ T8880] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 369.587956][ C0] mceusb 3-1:0.0: Error: urb status = -71 [ 369.594059][ T8880] mceusb 3-1:0.0: Registered 鐱淂꼃堔谨⦲ﯨ杴肾֖䜪꼸鎂췡鳷㓊演嵑㯂㦄 with mce emulator interface version 1 [ 369.608085][ C0] mceusb 3-1:0.0: Error: urb status = -71 [ 369.627965][ C0] mceusb 3-1:0.0: Error: urb status = -71 [ 369.647958][ C0] mceusb 3-1:0.0: Error: urb status = -71 [ 369.654130][ T8880] mceusb 3-1:0.0: 2 tx ports (0x0 cabled) and 2 rx sensors (0x0 active) [ 369.667962][ C0] mceusb 3-1:0.0: Error: urb status = -71 [ 369.678422][ T8880] usb 3-1: USB disconnect, device number 19 [ 370.168366][ T3866] Bluetooth: hci4: command 0x040f tx timeout [ 370.369260][ T3643] usb 3-1: new high-speed USB device number 20 using dummy_hcd [ 370.568072][ T3643] usb 3-1: device descriptor read/64, error 18 [ 370.858014][ T3643] usb 3-1: new high-speed USB device number 21 using dummy_hcd 01:43:58 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:43:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x10000) fstat(r1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = syz_usb_connect(0x0, 0x4a, &(0x7f0000000500)=ANY=[@ANYBLOB="120100005520f010402038b1420104000001090238000100000000090400000371055900090582ef10000000010200090502"], 0x0) syz_usb_control_io$printer(r2, &(0x7f0000000140)={0x14, 0x0, &(0x7f0000000180)={0x0, 0x3, 0xd7, @string={0xd7, 0x3, "3194c26d03af35da1458288cb229e8fb7467be8096052a4738af8293ede1e1cdf79cca34146f515dc23b8439b5ee1ef1a6055b7849aaaf0b5fc37ac0e7365b95bb868321480c303a5b1eaf411c96fe21c85ba64a8e1ae98e0c8e8851883309c6236122a07ab73258f7e6af0cb11345695c09a7b9b5d2ec26a4ce22000c834c3d59578a00eace7a35300beacf5d9725bb6d837a2a6f40de98ac659d391a579931a8e4728438671660711b2d0bbd0f6f2a1fa3c3a15921c147e258eee0c3f8c756a31000fd0ffab52109bdc39d0f2d526fba52bc4c8f"}}}, 0x0) syz_usb_ep_write$ath9k_ep1(r2, 0x82, 0x88, &(0x7f00000009c0)=ANY=[@ANYBLOB="6e32ecab44e9564fa0522d0ea25edfc652d126b296"]) 01:43:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sched_setparam(0x0, &(0x7f00000000c0)=0xa0) sched_getscheduler(r0) setpriority(0x0, r0, 0x3f) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r2 = fanotify_init(0x0, 0x1000) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000240)=""/135, 0x87}], 0x1) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000380), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 01:43:58 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 371.053452][T24628] IPVS: ftp: loaded support on port[0] = 21 [ 371.067983][ T3643] usb 3-1: device descriptor read/64, error 18 01:43:58 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 371.198091][ T3643] usb usb3-port1: attempt power cycle [ 371.247402][T24659] loop5: detected capacity change from 0 to 4 [ 371.265242][T24659] MINIX-fs: bad superblock or unable to read bitmaps 01:43:58 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 371.384999][T24665] loop5: detected capacity change from 0 to 4 [ 371.396104][T24665] MINIX-fs: bad superblock or unable to read bitmaps 01:43:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 371.542662][T24671] loop5: detected capacity change from 0 to 4 [ 371.575171][T24671] MINIX-fs: bad superblock or unable to read bitmaps 01:43:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 371.720371][T24677] loop5: detected capacity change from 0 to 4 [ 371.763581][T24677] MINIX-fs: bad superblock or unable to read bitmaps 01:43:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 371.903246][T24684] loop5: detected capacity change from 0 to 4 [ 371.918044][ T3643] usb 3-1: new high-speed USB device number 22 using dummy_hcd [ 371.968025][T24684] MINIX-fs: bad superblock or unable to read bitmaps 01:43:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 372.008733][ T3238] ieee802154 phy0 wpan0: encryption failed: -22 [ 372.015020][ T3238] ieee802154 phy1 wpan1: encryption failed: -22 [ 372.058412][ T3643] usb 3-1: Using ep0 maxpacket: 16 01:43:59 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 372.096609][T24691] loop5: detected capacity change from 0 to 4 [ 372.123122][T24691] MINIX-fs: bad superblock or unable to read bitmaps 01:43:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 372.178320][ T3643] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 372.209597][ T3643] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 372.222164][T24699] loop5: detected capacity change from 0 to 8 [ 372.227967][ T3643] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 372.239963][T24698] loop1: detected capacity change from 0 to 4 [ 372.248017][ T8880] Bluetooth: hci4: command 0x0419 tx timeout [ 372.252046][ T3643] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 372.263743][T24698] MINIX-fs: bad superblock or unable to read bitmaps [ 372.274682][ T3643] usb 3-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 372.289605][T24699] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:00 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 372.369742][ T3643] usb 3-1: New USB device found, idVendor=2040, idProduct=b138, bcdDevice= 1.42 [ 372.387970][ T3643] usb 3-1: New USB device strings: Mfr=4, Product=0, SerialNumber=0 [ 372.395984][ T3643] usb 3-1: Manufacturer: syz [ 372.402498][T24709] loop5: detected capacity change from 0 to 8 [ 372.409336][ T3643] usb 3-1: config 0 descriptor?? [ 372.416647][T24709] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 372.727975][ T3643] rc_core: IR keymap rc-hauppauge not found [ 372.733901][ T3643] Registered IR keymap rc-empty [ 372.748058][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 372.777992][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 372.808367][ T3643] rc rc0: Conexant Hybrid TV (cx231xx) MCE IR no TX (2040:b138) as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 372.838653][ T3643] input: Conexant Hybrid TV (cx231xx) MCE IR no TX (2040:b138) as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input43 [ 372.877830][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 372.928072][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 372.959338][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 372.987999][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.017987][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.058203][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.088003][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.127972][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.157994][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.188010][ T3643] mceusb 3-1:0.0: Error: mce write submit urb error = -90 [ 373.228348][ T3643] mceusb 3-1:0.0: Registered 鐱淂꼃堔谨⦲ﯨ杴肾֖䜪꼸鎂췡鳷㓊演嵑㯂㦄 with mce emulator interface version 1 [ 373.241994][ T3643] mceusb 3-1:0.0: 2 tx ports (0x0 cabled) and 2 rx sensors (0x0 active) [ 373.310449][ T3643] usb 3-1: USB disconnect, device number 22 01:44:01 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:01 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:01 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 373.887209][T24744] loop1: detected capacity change from 0 to 4 [ 373.887998][T24741] loop5: detected capacity change from 0 to 8 [ 373.893419][T24742] loop2: detected capacity change from 0 to 8 [ 373.908308][T24741] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 373.916498][T24742] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 373.934588][T24744] MINIX-fs: bad superblock or unable to read bitmaps 01:44:01 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) sched_setparam(0x0, &(0x7f00000000c0)=0xa0) sched_getscheduler(r0) setpriority(0x0, r0, 0x3f) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) r2 = fanotify_init(0x0, 0x1000) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000240)=""/135, 0x87}], 0x1) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000380), 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 01:44:01 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 374.106528][T24760] loop5: detected capacity change from 0 to 8 [ 374.123150][T24763] IPVS: ftp: loaded support on port[0] = 21 [ 374.140740][T24760] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 374.167073][T24775] loop1: detected capacity change from 0 to 4 01:44:01 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 374.208046][T24775] MINIX-fs: bad superblock or unable to read bitmaps [ 374.261852][T24792] loop5: detected capacity change from 0 to 8 [ 374.272114][T24792] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:01 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 1: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 374.416932][T24800] loop5: detected capacity change from 0 to 8 [ 374.442818][T24800] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 374.442930][T24802] loop1: detected capacity change from 0 to 4 01:44:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 1: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 374.595841][T24808] loop5: detected capacity change from 0 to 8 [ 374.615727][T24808] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 1: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 374.727313][T24814] loop1: detected capacity change from 0 to 4 [ 374.752283][T24819] loop5: detected capacity change from 0 to 8 01:44:02 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 374.817911][T24819] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="16f6c3b9ff56dd61f6fd35eb2987aaac68cfa7a5f9bb1ad291a605072513c7f58b7b627ecfac", 0x26, r1) [ 374.888011][T24827] loop2: detected capacity change from 0 to 8 [ 374.898766][T24827] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 374.904611][T24828] loop1: detected capacity change from 0 to 4 01:44:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="16f6c3b9ff56dd61f6fd35eb2987aaac68cfa7a5f9bb1ad291a605072513c7f58b7b627ecfac", 0x26, r1) [ 374.960143][T24836] loop5: detected capacity change from 0 to 8 [ 374.975772][T24836] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:02 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="16f6c3b9ff56dd61f6fd35eb2987aaac68cfa7a5f9bb1ad291a605072513c7f58b7b627ecfac", 0x26, r1) 01:44:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b", 0xae, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="16f6c3b9ff56dd61f6fd35eb2987aaac68cfa7a5f9bb1ad291a605072513c7f58b7b627ecfac", 0x26, r1) [ 375.129641][T24852] loop5: detected capacity change from 0 to 8 [ 375.148319][T24854] loop1: detected capacity change from 0 to 4 [ 375.150768][T24852] MINIX-fs: bad superblock or unable to read bitmaps 01:44:02 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b42469d9bcad87ca45488f3cbf783297f0e39a799e71cfe3710251fe46299fbf47dee6344ed9b5c8be3a6f438e07fa8761c2420724c52715fa99eb2225232eb4becdb18286b2b5c07c652750423428f76c266cffa9c5573bc477bf598938ef246b05fd8f53a3bd4b96959ec8952a72c05347d446b26b740aa246477d5e54bac1eb3325084a0f6b87ff0befe11dbdb6a258570f7e506a026161440228bad77c3fcae8827442f251f54ae7df16cd959", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:02 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 375.289100][T24864] loop1: detected capacity change from 0 to 4 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 375.370280][T24872] loop5: detected capacity change from 0 to 8 [ 375.397532][T24872] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 375.448544][T24879] loop1: detected capacity change from 0 to 4 01:44:03 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 375.528104][T24884] loop5: detected capacity change from 0 to 8 [ 375.544480][T24884] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 2: request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:03 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 375.664312][T24899] loop5: detected capacity change from 0 to 8 [ 375.684963][T24899] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:03 executing program 2: request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:03 executing program 2: request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) [ 375.787728][T24907] loop5: detected capacity change from 0 to 8 [ 375.808703][T24907] MINIX-fs: bad superblock or unable to read bitmaps 01:44:03 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x15c, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 375.959942][T24920] loop1: detected capacity change from 0 to 4 [ 375.973862][T24920] MINIX-fs: bad superblock or unable to read bitmaps [ 375.993831][T24923] loop5: detected capacity change from 0 to 8 01:44:03 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.034560][T24923] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 376.171659][T24934] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:03 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.239565][T24942] loop5: detected capacity change from 0 to 8 [ 376.265545][T24942] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.392347][T24953] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.442008][T24958] loop5: detected capacity change from 0 to 8 [ 376.466973][T24958] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:04 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb0333", 0x2c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 376.593499][T24966] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.648041][T24973] loop5: detected capacity change from 0 to 8 [ 376.658349][T24973] MINIX-fs: bad superblock or unable to read bitmaps 01:44:04 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 376.743038][T24982] loop1: detected capacity change from 0 to 4 [ 376.759824][T24982] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:04 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.808088][T24989] loop5: detected capacity change from 0 to 8 [ 376.827385][T24989] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:04 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:04 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 376.940007][T24999] loop1: detected capacity change from 0 to 4 [ 376.969736][T24999] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:04 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) [ 377.015518][T25008] loop5: detected capacity change from 0 to 8 [ 377.059137][T25008] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:04 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 377.110644][T25015] loop1: detected capacity change from 0 to 4 [ 377.164109][T25015] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 377.184957][T25021] loop5: detected capacity change from 0 to 8 [ 377.195150][T25021] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:04 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be", 0x17, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 377.305535][T25030] loop1: detected capacity change from 0 to 4 [ 377.321410][T25032] loop5: detected capacity change from 0 to 8 [ 377.327567][T25030] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 377.341076][T25032] MINIX-fs: bad superblock or unable to read bitmaps 01:44:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 377.479866][T25042] loop5: detected capacity change from 0 to 8 [ 377.487274][T25043] loop1: detected capacity change from 0 to 4 [ 377.495843][T25042] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 377.496785][T25043] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 377.617039][T25053] loop5: detected capacity change from 0 to 8 [ 377.638063][T25053] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 377.648037][T25057] loop1: detected capacity change from 0 to 4 [ 377.658070][T25057] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0ca60f02fdfd1763c7559ac538808380aa9c41b51e59e451dabdeb192af9874cf334aa1ed420fc674daebb76ddd6585b1a781d620baf4865f2eb18588d82335e2bd621f05f2b6c1daca2186e21c933e8310fc59e7289b96b", 0xae, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 377.797129][T25066] loop5: detected capacity change from 0 to 8 [ 377.803323][T25068] loop1: detected capacity change from 0 to 4 [ 377.813693][T25068] MINIX-fs: bad superblock or unable to read bitmaps [ 377.826579][T25066] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 377.932128][T25077] loop1: detected capacity change from 0 to 4 [ 377.950443][T25077] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 378.002983][T25081] loop5: detected capacity change from 0 to 8 [ 378.012737][T25081] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.059429][T25085] loop1: detected capacity change from 0 to 4 [ 378.087404][T25085] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.181344][T25092] loop5: detected capacity change from 0 to 8 [ 378.221159][T25092] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.231470][T25097] loop1: detected capacity change from 0 to 4 [ 378.247559][T25097] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.348223][T25104] loop5: detected capacity change from 0 to 8 [ 378.366500][T25104] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.437070][T25108] loop1: detected capacity change from 0 to 4 [ 378.458072][T25108] MINIX-fs: bad superblock or unable to read bitmaps 01:44:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.550169][T25115] loop5: detected capacity change from 0 to 8 [ 378.570586][T25115] MINIX-fs: bad superblock or unable to read bitmaps 01:44:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.653659][T25121] loop1: detected capacity change from 0 to 4 [ 378.682096][T25121] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.715003][T25127] loop5: detected capacity change from 0 to 8 [ 378.725512][T25127] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.811268][T25133] loop1: detected capacity change from 0 to 4 [ 378.837977][T25133] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 378.850149][T25138] loop5: detected capacity change from 0 to 8 [ 378.867424][T25138] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 378.991099][T25144] loop1: detected capacity change from 0 to 4 [ 379.008275][T25144] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb0333", 0x2c, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.051078][T25150] loop5: detected capacity change from 0 to 8 [ 379.066687][T25150] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 379.141554][T25159] loop5: detected capacity change from 0 to 8 [ 379.152729][T25159] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 379.158382][T25158] loop1: detected capacity change from 0 to 4 01:44:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.201736][T25158] MINIX-fs: bad superblock or unable to read bitmaps [ 379.273120][T25165] loop5: detected capacity change from 0 to 8 01:44:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.320495][T25165] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.379323][T25173] loop1: detected capacity change from 0 to 4 [ 379.399620][T25173] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:07 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.476011][T25180] loop5: detected capacity change from 0 to 8 [ 379.490242][T25180] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 379.515232][T25185] loop1: detected capacity change from 0 to 4 01:44:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:07 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.563583][T25185] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 379.683872][T25194] loop5: detected capacity change from 0 to 8 [ 379.703695][T25194] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 379.721268][T25196] loop1: detected capacity change from 0 to 4 01:44:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.752466][T25196] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:07 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be", 0x17, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.876509][T25203] loop5: detected capacity change from 0 to 8 01:44:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.917983][T25203] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 379.956071][T25208] loop1: detected capacity change from 0 to 4 01:44:07 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 379.987995][T25208] MINIX-fs: bad superblock or unable to read bitmaps [ 380.064245][T25215] loop5: detected capacity change from 0 to 8 [ 380.080018][T25216] loop1: detected capacity change from 0 to 4 [ 380.089718][T25215] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 380.116033][T25216] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:07 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 380.229635][T25228] loop1: detected capacity change from 0 to 4 [ 380.238658][T25227] loop5: detected capacity change from 0 to 8 [ 380.253541][T25228] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 380.258294][T25227] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 01:44:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:07 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:08 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 380.399061][T25239] loop5: detected capacity change from 0 to 8 [ 380.409819][T25241] loop1: detected capacity change from 0 to 4 [ 380.417270][T25239] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 380.426788][T25241] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:08 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 380.529856][T25249] loop5: detected capacity change from 0 to 8 [ 380.580139][T25249] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 380.617456][T25254] loop1: detected capacity change from 0 to 4 01:44:08 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) [ 380.658126][T25254] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:08 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 380.701151][T25260] loop5: detected capacity change from 0 to 8 01:44:08 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) [ 380.851360][T25268] loop1: detected capacity change from 0 to 4 [ 380.869822][T25268] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 380.877869][T25271] loop5: detected capacity change from 0 to 8 01:44:08 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:08 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) 01:44:08 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 381.088821][T25279] loop1: detected capacity change from 0 to 4 [ 381.098200][T25279] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:08 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 381.132864][T25284] loop5: detected capacity change from 0 to 8 01:44:08 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 381.193213][T25288] loop1: detected capacity change from 0 to 4 [ 381.216339][T25288] MINIX-fs: bad superblock or unable to read bitmaps [ 381.308046][T25293] loop5: detected capacity change from 0 to 8 [ 381.328268][T25293] MINIX-fs: bad superblock or unable to read bitmaps [ 381.349278][T25299] loop1: detected capacity change from 0 to 4 01:44:09 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 381.408004][T25299] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 381.555454][T25307] loop1: detected capacity change from 0 to 4 [ 381.573522][T25307] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:09 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 381.691039][T25314] loop1: detected capacity change from 0 to 4 [ 381.713031][T25314] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:09 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:09 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 381.853595][T25320] loop1: detected capacity change from 0 to 4 [ 381.864605][T25320] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:09 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 381.988445][T25324] loop1: detected capacity change from 0 to 4 [ 382.010677][T25324] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 382.118926][T25331] loop1: detected capacity change from 0 to 4 01:44:09 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 382.162862][T25331] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 382.277992][T25335] loop1: detected capacity change from 0 to 4 [ 382.287857][T25335] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 382.456635][T25343] loop1: detected capacity change from 0 to 4 [ 382.491602][T25343] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 382.687765][T25349] loop1: detected capacity change from 0 to 4 [ 382.704808][T25349] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 382.867552][T25355] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 382.993250][T25360] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, 0x0) [ 383.148332][T25366] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 383.250857][T25372] loop1: detected capacity change from 0 to 4 01:44:10 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, 0x0) 01:44:11 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, 0x0) [ 383.412479][T25378] loop1: detected capacity change from 0 to 4 01:44:11 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 383.518030][T25384] loop1: detected capacity change from 0 to 4 [ 383.607895][T25388] loop1: detected capacity change from 0 to 4 [ 383.645136][T25388] MINIX-fs: bad superblock or unable to read bitmaps 01:44:23 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:23 executing program 3: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:23 executing program 4: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:23 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:23 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:23 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 396.088037][T25399] loop4: detected capacity change from 0 to 8 [ 396.096614][T25404] FAULT_INJECTION: forcing a failure. [ 396.096614][T25404] name failslab, interval 1, probability 0, space 0, times 1 [ 396.110198][T25401] loop2: detected capacity change from 0 to 8 [ 396.119975][T25399] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. [ 396.133457][T25408] loop0: detected capacity change from 0 to 8 [ 396.137483][T25411] FAULT_INJECTION: forcing a failure. [ 396.137483][T25411] name failslab, interval 1, probability 0, space 0, times 1 [ 396.155618][T25401] MINIX-fs: bad superblock or unable to read bitmaps [ 396.163727][T25409] loop3: detected capacity change from 0 to 4 [ 396.165070][T25408] MINIX-fs: bad superblock or unable to read bitmaps [ 396.210248][T25409] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. [ 396.210590][T25404] CPU: 0 PID: 25404 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 396.227319][T25404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.237494][T25404] Call Trace: [ 396.240771][T25404] dump_stack+0x137/0x19d [ 396.245167][T25404] should_fail+0x23c/0x250 [ 396.249590][T25404] __should_failslab+0x81/0x90 [ 396.254469][T25404] ? __se_sys_memfd_create+0xfb/0x390 [ 396.259842][T25404] should_failslab+0x5/0x20 [ 396.264372][T25404] __kmalloc+0x66/0x380 [ 396.268530][T25404] ? strnlen_user+0x137/0x1c0 [ 396.273278][T25404] __se_sys_memfd_create+0xfb/0x390 [ 396.278524][T25404] __x64_sys_memfd_create+0x2d/0x40 [ 396.283792][T25404] do_syscall_64+0x39/0x80 [ 396.288294][T25404] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.294196][T25404] RIP: 0033:0x466459 [ 396.298088][T25404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.318064][T25404] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 396.326936][T25404] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 396.334905][T25404] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 396.342979][T25404] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 396.350948][T25404] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 01:44:24 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:24 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700005abac434000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r8, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', r2, 0x4, 0x1, 0x0, 0x6, 0x5, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @multicast1}, 0x7, 0x7800, 0x10000, 0x80000001}}) sendmsg$nl_route_sched(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=@newqdisc={0x390, 0x24, 0x4, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xfff1, 0x3}, {0xffff, 0xa}, {0x7, 0xb}}, [@TCA_STAB={0x9c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x3, 0x7, 0x0, 0x2, 0x80, 0x959e, 0x2}}, {0x8, 0x2, [0xfffa, 0xff]}}, {{0x1c, 0x1, {0x0, 0x0, 0xaa20, 0xfffffff7, 0x2, 0xffff, 0x518, 0x8}}, {0x14, 0x2, [0x7f, 0x1, 0xd74, 0x1f, 0x47b, 0x9, 0x7f, 0x8]}}, {{0x1c, 0x1, {0x4, 0x0, 0x10, 0x3, 0x2, 0x2, 0x400}}, {0x4}}, {{0x1c, 0x1, {0x8, 0x3, 0x5, 0x8, 0x0, 0x0, 0x7, 0x2}}, {0x8, 0x2, [0x1f, 0x0]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_RATE={0x6, 0x5, {0x0, 0x1f}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x7}}, @TCA_STAB={0x14c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x20, 0x5, 0x20, 0x100, 0x2, 0x1ff, 0x6, 0x1}}, {0x6, 0x2, [0x8]}}, {{0x1c, 0x1, {0x6, 0x9, 0x2, 0x3, 0x0, 0x9, 0x1, 0x3}}, {0xa, 0x2, [0x1, 0x6, 0x3ff]}}, {{0x1c, 0x1, {0xd1, 0x32, 0x7f, 0x1, 0x0, 0xfd, 0x4, 0x7}}, {0x12, 0x2, [0xff, 0x3ff, 0x7fff, 0x95b, 0x4, 0x8000, 0x4]}}, {{0x1c, 0x1, {0x7, 0x8, 0x42, 0x0, 0x2, 0x3, 0x9, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x8, 0x1, 0x6, 0x7, 0x0, 0x2, 0x0, 0x4}}, {0xc, 0x2, [0xc38, 0x5, 0xfff9, 0x2]}}, {{0x1c, 0x1, {0x6, 0x7f, 0x7fff, 0x4, 0x0, 0x2, 0x9, 0x9}}, {0x16, 0x2, [0x6, 0x1, 0x1000, 0xabc3, 0xfa6d, 0xd58, 0x9, 0x712, 0x4]}}, {{0x1c, 0x1, {0xc7, 0x7, 0x200, 0x1, 0x0, 0x5ed, 0x16020070, 0x2}}, {0x8, 0x2, [0x9, 0x0]}}, {{0x1c, 0x1, {0xd0, 0x6, 0x3, 0x0, 0x0, 0xfffffeff, 0x100, 0x4}}, {0xc, 0x2, [0x3, 0x6, 0x71be, 0x2]}}]}, @TCA_STAB={0x104, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x24, 0x1f, 0xfffff1d9, 0x1, 0x81, 0x8, 0x6}}, {0x10, 0x2, [0x6, 0x7f, 0x87f, 0x5, 0x2, 0x400]}}, {{0x1c, 0x1, {0xff, 0x0, 0x2, 0xac, 0x2, 0x7ff, 0x5, 0x7}}, {0x12, 0x2, [0xfffc, 0x9, 0x3, 0x0, 0x3, 0x195, 0x1]}}, {{0x1c, 0x1, {0x5, 0x0, 0x0, 0x8b34, 0x0, 0x2, 0x98, 0x7}}, {0x12, 0x2, [0x4, 0x3, 0x37d, 0xe000, 0x29b6, 0x4, 0x93]}}, {{0x1c, 0x1, {0x92, 0x57, 0x3, 0x8, 0x2, 0x8f, 0xffff7fff, 0x3}}, {0xa, 0x2, [0x6, 0x4, 0x5]}}, {{0x1c, 0x1, {0x5, 0x0, 0x1f, 0x6, 0x1, 0x8001, 0x3f, 0x3}}, {0xa, 0x2, [0x5, 0x9, 0x5]}}, {{0x1c, 0x1, {0x0, 0x8, 0x7, 0x3, 0x2, 0x4, 0xffffffff, 0x2}}, {0x8, 0x2, [0x1f, 0x8]}}]}, @qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x1000, 0xfffffff9, 0x0, 0x1cb, 0x4}, 0x8, 0x1, 0x1d14, 0xb5, 0x6, 0x1f, 0xc, 0xc, 0x4, 0x8001, {0x0, 0x6, 0x3f, 0x1, 0x2, 0x7fff}}}}, @qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x390}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000000000c305a0fe000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) [ 396.359093][T25404] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 [ 396.369767][T25411] CPU: 0 PID: 25411 Comm: syz-executor.5 Not tainted 5.12.0-rc5-syzkaller #0 [ 396.378550][T25411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.388601][T25411] Call Trace: [ 396.391917][T25411] dump_stack+0x137/0x19d [ 396.396255][T25411] should_fail+0x23c/0x250 [ 396.400671][T25411] __should_failslab+0x81/0x90 [ 396.405607][T25411] ? __se_sys_memfd_create+0xfb/0x390 [ 396.410984][T25411] should_failslab+0x5/0x20 [ 396.415513][T25411] __kmalloc+0x66/0x380 [ 396.419699][T25411] ? strnlen_user+0x137/0x1c0 [ 396.424384][T25411] __se_sys_memfd_create+0xfb/0x390 [ 396.429652][T25411] __x64_sys_memfd_create+0x2d/0x40 [ 396.434932][T25411] do_syscall_64+0x39/0x80 [ 396.439362][T25411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.445295][T25411] RIP: 0033:0x466459 [ 396.449202][T25411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.468810][T25411] RSP: 002b:00007f1710951f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 396.477223][T25411] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 396.485189][T25411] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 396.493159][T25411] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 396.501132][T25411] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 01:44:24 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 396.509117][T25411] R13: 0000000020000100 R14: 0000000000001000 R15: 0000000020011500 01:44:24 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 396.580634][T25426] FAULT_INJECTION: forcing a failure. [ 396.580634][T25426] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 396.595885][T25425] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 396.609296][T25426] CPU: 0 PID: 25426 Comm: syz-executor.3 Not tainted 5.12.0-rc5-syzkaller #0 [ 396.618095][T25426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.628150][T25426] Call Trace: [ 396.631433][T25426] dump_stack+0x137/0x19d [ 396.633072][T25430] FAULT_INJECTION: forcing a failure. [ 396.633072][T25430] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 396.635774][T25426] should_fail+0x23c/0x250 [ 396.635800][T25426] should_fail_usercopy+0x16/0x20 [ 396.658213][T25426] _copy_to_user+0x1c/0x90 [ 396.662639][T25426] simple_read_from_buffer+0xab/0x120 [ 396.668036][T25426] proc_fail_nth_read+0xf6/0x140 [ 396.672977][T25426] ? rw_verify_area+0x136/0x250 [ 396.677832][T25426] ? proc_fault_inject_write+0x200/0x200 [ 396.683466][T25426] vfs_read+0x154/0x5d0 [ 396.687633][T25426] ? __fget_light+0x219/0x260 [ 396.692340][T25426] ksys_read+0xce/0x180 [ 396.696607][T25426] __x64_sys_read+0x3e/0x50 [ 396.701140][T25426] do_syscall_64+0x39/0x80 [ 396.705561][T25426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.711500][T25426] RIP: 0033:0x4191dc [ 396.715577][T25426] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 396.735198][T25426] RSP: 002b:00007f1f5a752170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 396.743714][T25426] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191dc [ 396.751683][T25426] RDX: 000000000000000f RSI: 00007f1f5a7521e0 RDI: 0000000000000004 [ 396.759667][T25426] RBP: 00007f1f5a7521d0 R08: 0000000000000000 R09: 0000000000000000 [ 396.767654][T25426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.775642][T25426] R13: 00007fff9eefeeaf R14: 00007f1f5a752300 R15: 0000000000022000 [ 396.790170][T25425] batman_adv: batadv0: Adding interface: bridge1 [ 396.796608][T25425] batman_adv: batadv0: The MTU of interface bridge1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 396.821419][T25435] loop2: detected capacity change from 0 to 8 [ 396.825042][T25430] CPU: 1 PID: 25430 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 396.836776][T25430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.840493][T25435] MINIX-fs: bad superblock or unable to read bitmaps [ 396.846827][T25430] Call Trace: [ 396.846838][T25430] dump_stack+0x137/0x19d [ 396.861118][T25430] should_fail+0x23c/0x250 [ 396.865534][T25430] should_fail_usercopy+0x16/0x20 [ 396.870587][T25430] _copy_from_user+0x1c/0xd0 [ 396.875181][T25430] __se_sys_memfd_create+0x137/0x390 [ 396.880493][T25430] __x64_sys_memfd_create+0x2d/0x40 [ 396.885694][T25430] do_syscall_64+0x39/0x80 [ 396.890470][T25430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.896367][T25430] RIP: 0033:0x466459 [ 396.900311][T25430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.919916][T25430] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 396.928458][T25430] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 396.936455][T25430] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 396.944507][T25430] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 396.952474][T25430] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 396.960472][T25430] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 [ 396.974857][T25427] loop0: detected capacity change from 0 to 8 01:44:24 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:24 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 396.987733][T25425] batman_adv: batadv0: Not using interface bridge1 (retrying later): interface not active [ 397.003357][T25439] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 397.028380][T25427] MINIX-fs: bad superblock or unable to read bitmaps [ 397.048535][T25439] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 397.056798][T25439] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 397.064638][T25439] batman_adv: batadv0: Removing interface: batadv_slave_1 01:44:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 397.072459][T25439] batman_adv: batadv0: Removing interface: bridge1 [ 397.125236][T25445] loop5: detected capacity change from 0 to 8 [ 397.134301][T25445] MINIX-fs: bad superblock or unable to read bitmaps [ 397.142058][T25448] FAULT_INJECTION: forcing a failure. [ 397.142058][T25448] name failslab, interval 1, probability 0, space 0, times 0 [ 397.156770][T25448] CPU: 1 PID: 25448 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 01:44:24 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 397.165814][T25448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.175986][T25448] Call Trace: [ 397.179342][T25448] dump_stack+0x137/0x19d [ 397.183757][T25448] should_fail+0x23c/0x250 [ 397.188224][T25448] ? shmem_alloc_inode+0x22/0x30 [ 397.193185][T25448] __should_failslab+0x81/0x90 [ 397.198045][T25448] ? shmem_match+0xa0/0xa0 [ 397.202544][T25448] should_failslab+0x5/0x20 [ 397.207080][T25448] kmem_cache_alloc+0x46/0x320 [ 397.211871][T25448] ? __rcu_read_unlock+0x5c/0x250 [ 397.217074][T25448] ? fsnotify_perm+0x59/0x2e0 [ 397.221774][T25448] ? shmem_match+0xa0/0xa0 [ 397.226198][T25448] shmem_alloc_inode+0x22/0x30 [ 397.231071][T25448] new_inode_pseudo+0x38/0x190 [ 397.235913][T25448] new_inode+0x21/0x100 [ 397.240075][T25448] shmem_get_inode+0xa1/0x440 [ 397.244774][T25448] __shmem_file_setup+0xf1/0x1d0 [ 397.249922][T25448] shmem_file_setup+0x37/0x40 [ 397.254659][T25448] __se_sys_memfd_create+0x1eb/0x390 [ 397.260031][T25448] __x64_sys_memfd_create+0x2d/0x40 [ 397.265233][T25448] do_syscall_64+0x39/0x80 [ 397.269652][T25448] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 397.275573][T25448] RIP: 0033:0x466459 [ 397.279552][T25448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 397.299161][T25448] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 397.300424][T25453] loop0: detected capacity change from 0 to 8 [ 397.307689][T25448] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 01:44:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0xf0ff7f) 01:44:25 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:25 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 397.307706][T25448] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 397.307720][T25448] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 397.337692][T25448] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 397.345668][T25448] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 01:44:25 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 397.404391][T25453] MINIX-fs: bad superblock or unable to read bitmaps [ 397.419889][T25461] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 397.422133][T25463] FAULT_INJECTION: forcing a failure. [ 397.422133][T25463] name failslab, interval 1, probability 0, space 0, times 0 [ 397.442008][T25463] CPU: 0 PID: 25463 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 397.450789][T25463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.465128][T25463] Call Trace: [ 397.468420][T25463] dump_stack+0x137/0x19d [ 397.473011][T25463] should_fail+0x23c/0x250 [ 397.478069][T25463] ? security_inode_alloc+0x30/0x180 [ 397.483362][T25463] __should_failslab+0x81/0x90 [ 397.488140][T25463] should_failslab+0x5/0x20 [ 397.492669][T25463] kmem_cache_alloc+0x46/0x320 [ 397.497435][T25463] security_inode_alloc+0x30/0x180 [ 397.502644][T25463] inode_init_always+0x222/0x440 [ 397.507592][T25463] ? shmem_match+0xa0/0xa0 [ 397.512033][T25463] new_inode_pseudo+0x6f/0x190 [ 397.516818][T25463] new_inode+0x21/0x100 [ 397.521000][T25463] shmem_get_inode+0xa1/0x440 [ 397.525682][T25463] __shmem_file_setup+0xf1/0x1d0 [ 397.530716][T25463] shmem_file_setup+0x37/0x40 [ 397.535484][T25463] __se_sys_memfd_create+0x1eb/0x390 [ 397.540777][T25463] __x64_sys_memfd_create+0x2d/0x40 [ 397.545977][T25463] do_syscall_64+0x39/0x80 [ 397.550568][T25463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 397.556465][T25463] RIP: 0033:0x466459 [ 397.560372][T25463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 397.579978][T25463] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 397.588402][T25463] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 397.596369][T25463] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 397.604403][T25463] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 397.612452][T25463] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 397.620425][T25463] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 [ 397.644285][T25471] loop5: detected capacity change from 0 to 8 01:44:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x7ffff000) [ 397.663412][T25471] MINIX-fs: bad superblock or unable to read bitmaps [ 397.666745][T25465] loop2: detected capacity change from 0 to 8 [ 397.679800][T25465] MINIX-fs: bad superblock or unable to read bitmaps 01:44:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700005abac434000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r8, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', r2, 0x4, 0x1, 0x0, 0x6, 0x5, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @multicast1}, 0x7, 0x7800, 0x10000, 0x80000001}}) sendmsg$nl_route_sched(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=@newqdisc={0x390, 0x24, 0x4, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xfff1, 0x3}, {0xffff, 0xa}, {0x7, 0xb}}, [@TCA_STAB={0x9c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x3, 0x7, 0x0, 0x2, 0x80, 0x959e, 0x2}}, {0x8, 0x2, [0xfffa, 0xff]}}, {{0x1c, 0x1, {0x0, 0x0, 0xaa20, 0xfffffff7, 0x2, 0xffff, 0x518, 0x8}}, {0x14, 0x2, [0x7f, 0x1, 0xd74, 0x1f, 0x47b, 0x9, 0x7f, 0x8]}}, {{0x1c, 0x1, {0x4, 0x0, 0x10, 0x3, 0x2, 0x2, 0x400}}, {0x4}}, {{0x1c, 0x1, {0x8, 0x3, 0x5, 0x8, 0x0, 0x0, 0x7, 0x2}}, {0x8, 0x2, [0x1f, 0x0]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_RATE={0x6, 0x5, {0x0, 0x1f}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x7}}, @TCA_STAB={0x14c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x20, 0x5, 0x20, 0x100, 0x2, 0x1ff, 0x6, 0x1}}, {0x6, 0x2, [0x8]}}, {{0x1c, 0x1, {0x6, 0x9, 0x2, 0x3, 0x0, 0x9, 0x1, 0x3}}, {0xa, 0x2, [0x1, 0x6, 0x3ff]}}, {{0x1c, 0x1, {0xd1, 0x32, 0x7f, 0x1, 0x0, 0xfd, 0x4, 0x7}}, {0x12, 0x2, [0xff, 0x3ff, 0x7fff, 0x95b, 0x4, 0x8000, 0x4]}}, {{0x1c, 0x1, {0x7, 0x8, 0x42, 0x0, 0x2, 0x3, 0x9, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x8, 0x1, 0x6, 0x7, 0x0, 0x2, 0x0, 0x4}}, {0xc, 0x2, [0xc38, 0x5, 0xfff9, 0x2]}}, {{0x1c, 0x1, {0x6, 0x7f, 0x7fff, 0x4, 0x0, 0x2, 0x9, 0x9}}, {0x16, 0x2, [0x6, 0x1, 0x1000, 0xabc3, 0xfa6d, 0xd58, 0x9, 0x712, 0x4]}}, {{0x1c, 0x1, {0xc7, 0x7, 0x200, 0x1, 0x0, 0x5ed, 0x16020070, 0x2}}, {0x8, 0x2, [0x9, 0x0]}}, {{0x1c, 0x1, {0xd0, 0x6, 0x3, 0x0, 0x0, 0xfffffeff, 0x100, 0x4}}, {0xc, 0x2, [0x3, 0x6, 0x71be, 0x2]}}]}, @TCA_STAB={0x104, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x24, 0x1f, 0xfffff1d9, 0x1, 0x81, 0x8, 0x6}}, {0x10, 0x2, [0x6, 0x7f, 0x87f, 0x5, 0x2, 0x400]}}, {{0x1c, 0x1, {0xff, 0x0, 0x2, 0xac, 0x2, 0x7ff, 0x5, 0x7}}, {0x12, 0x2, [0xfffc, 0x9, 0x3, 0x0, 0x3, 0x195, 0x1]}}, {{0x1c, 0x1, {0x5, 0x0, 0x0, 0x8b34, 0x0, 0x2, 0x98, 0x7}}, {0x12, 0x2, [0x4, 0x3, 0x37d, 0xe000, 0x29b6, 0x4, 0x93]}}, {{0x1c, 0x1, {0x92, 0x57, 0x3, 0x8, 0x2, 0x8f, 0xffff7fff, 0x3}}, {0xa, 0x2, [0x6, 0x4, 0x5]}}, {{0x1c, 0x1, {0x5, 0x0, 0x1f, 0x6, 0x1, 0x8001, 0x3f, 0x3}}, {0xa, 0x2, [0x5, 0x9, 0x5]}}, {{0x1c, 0x1, {0x0, 0x8, 0x7, 0x3, 0x2, 0x4, 0xffffffff, 0x2}}, {0x8, 0x2, [0x1f, 0x8]}}]}, @qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x1000, 0xfffffff9, 0x0, 0x1cb, 0x4}, 0x8, 0x1, 0x1d14, 0xb5, 0x6, 0x1f, 0xc, 0xc, 0x4, 0x8001, {0x0, 0x6, 0x3f, 0x1, 0x2, 0x7fff}}}}, @qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x390}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000000000c305a0fe000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 01:44:25 executing program 0: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 397.760328][T25471] loop5: detected capacity change from 0 to 8 [ 397.774414][T25471] MINIX-fs: bad superblock or unable to read bitmaps 01:44:25 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:25 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x7ffffffff000) 01:44:25 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 397.894879][T25500] FAULT_INJECTION: forcing a failure. [ 397.894879][T25500] name failslab, interval 1, probability 0, space 0, times 0 [ 397.912296][T25501] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 397.913077][T25499] loop0: detected capacity change from 0 to 8 [ 397.927299][T25504] loop2: detected capacity change from 0 to 8 [ 397.939247][T25500] CPU: 1 PID: 25500 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 397.948034][T25500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.958089][T25500] Call Trace: [ 397.961369][T25500] dump_stack+0x137/0x19d [ 397.965714][T25500] should_fail+0x23c/0x250 [ 397.970142][T25500] ? __d_alloc+0x36/0x370 [ 397.971765][T25507] loop5: detected capacity change from 0 to 8 [ 397.974541][T25500] __should_failslab+0x81/0x90 [ 397.985358][T25500] should_failslab+0x5/0x20 [ 397.989872][T25500] kmem_cache_alloc+0x46/0x320 [ 397.994647][T25500] ? __init_rwsem+0x59/0x70 [ 397.999186][T25500] __d_alloc+0x36/0x370 [ 398.003397][T25500] ? current_time+0xdb/0x190 [ 398.006343][T25507] MINIX-fs: bad superblock or unable to read bitmaps [ 398.008018][T25500] d_alloc_pseudo+0x1a/0x50 [ 398.008040][T25500] alloc_file_pseudo+0x63/0x130 [ 398.008064][T25500] __shmem_file_setup+0x14c/0x1d0 [ 398.008089][T25500] shmem_file_setup+0x37/0x40 [ 398.008109][T25500] __se_sys_memfd_create+0x1eb/0x390 [ 398.008129][T25500] __x64_sys_memfd_create+0x2d/0x40 [ 398.008165][T25500] do_syscall_64+0x39/0x80 [ 398.049112][T25500] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 398.055017][T25500] RIP: 0033:0x466459 [ 398.058910][T25500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 398.079231][T25500] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 398.087688][T25500] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 01:44:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0xf0ff7f00000000) [ 398.095670][T25500] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 398.103639][T25500] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 398.111773][T25500] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 398.119742][T25500] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 01:44:25 executing program 0: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:25 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700005abac434000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r8, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', r2, 0x4, 0x1, 0x0, 0x6, 0x5, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @multicast1}, 0x7, 0x7800, 0x10000, 0x80000001}}) sendmsg$nl_route_sched(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=@newqdisc={0x390, 0x24, 0x4, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xfff1, 0x3}, {0xffff, 0xa}, {0x7, 0xb}}, [@TCA_STAB={0x9c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x3, 0x7, 0x0, 0x2, 0x80, 0x959e, 0x2}}, {0x8, 0x2, [0xfffa, 0xff]}}, {{0x1c, 0x1, {0x0, 0x0, 0xaa20, 0xfffffff7, 0x2, 0xffff, 0x518, 0x8}}, {0x14, 0x2, [0x7f, 0x1, 0xd74, 0x1f, 0x47b, 0x9, 0x7f, 0x8]}}, {{0x1c, 0x1, {0x4, 0x0, 0x10, 0x3, 0x2, 0x2, 0x400}}, {0x4}}, {{0x1c, 0x1, {0x8, 0x3, 0x5, 0x8, 0x0, 0x0, 0x7, 0x2}}, {0x8, 0x2, [0x1f, 0x0]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_RATE={0x6, 0x5, {0x0, 0x1f}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x7}}, @TCA_STAB={0x14c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x20, 0x5, 0x20, 0x100, 0x2, 0x1ff, 0x6, 0x1}}, {0x6, 0x2, [0x8]}}, {{0x1c, 0x1, {0x6, 0x9, 0x2, 0x3, 0x0, 0x9, 0x1, 0x3}}, {0xa, 0x2, [0x1, 0x6, 0x3ff]}}, {{0x1c, 0x1, {0xd1, 0x32, 0x7f, 0x1, 0x0, 0xfd, 0x4, 0x7}}, {0x12, 0x2, [0xff, 0x3ff, 0x7fff, 0x95b, 0x4, 0x8000, 0x4]}}, {{0x1c, 0x1, {0x7, 0x8, 0x42, 0x0, 0x2, 0x3, 0x9, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x8, 0x1, 0x6, 0x7, 0x0, 0x2, 0x0, 0x4}}, {0xc, 0x2, [0xc38, 0x5, 0xfff9, 0x2]}}, {{0x1c, 0x1, {0x6, 0x7f, 0x7fff, 0x4, 0x0, 0x2, 0x9, 0x9}}, {0x16, 0x2, [0x6, 0x1, 0x1000, 0xabc3, 0xfa6d, 0xd58, 0x9, 0x712, 0x4]}}, {{0x1c, 0x1, {0xc7, 0x7, 0x200, 0x1, 0x0, 0x5ed, 0x16020070, 0x2}}, {0x8, 0x2, [0x9, 0x0]}}, {{0x1c, 0x1, {0xd0, 0x6, 0x3, 0x0, 0x0, 0xfffffeff, 0x100, 0x4}}, {0xc, 0x2, [0x3, 0x6, 0x71be, 0x2]}}]}, @TCA_STAB={0x104, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x24, 0x1f, 0xfffff1d9, 0x1, 0x81, 0x8, 0x6}}, {0x10, 0x2, [0x6, 0x7f, 0x87f, 0x5, 0x2, 0x400]}}, {{0x1c, 0x1, {0xff, 0x0, 0x2, 0xac, 0x2, 0x7ff, 0x5, 0x7}}, {0x12, 0x2, [0xfffc, 0x9, 0x3, 0x0, 0x3, 0x195, 0x1]}}, {{0x1c, 0x1, {0x5, 0x0, 0x0, 0x8b34, 0x0, 0x2, 0x98, 0x7}}, {0x12, 0x2, [0x4, 0x3, 0x37d, 0xe000, 0x29b6, 0x4, 0x93]}}, {{0x1c, 0x1, {0x92, 0x57, 0x3, 0x8, 0x2, 0x8f, 0xffff7fff, 0x3}}, {0xa, 0x2, [0x6, 0x4, 0x5]}}, {{0x1c, 0x1, {0x5, 0x0, 0x1f, 0x6, 0x1, 0x8001, 0x3f, 0x3}}, {0xa, 0x2, [0x5, 0x9, 0x5]}}, {{0x1c, 0x1, {0x0, 0x8, 0x7, 0x3, 0x2, 0x4, 0xffffffff, 0x2}}, {0x8, 0x2, [0x1f, 0x8]}}]}, @qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x1000, 0xfffffff9, 0x0, 0x1cb, 0x4}, 0x8, 0x1, 0x1d14, 0xb5, 0x6, 0x1f, 0xc, 0xc, 0x4, 0x8001, {0x0, 0x6, 0x3f, 0x1, 0x2, 0x7fff}}}}, @qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x390}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000000000c305a0fe000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 01:44:25 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 398.229980][T25507] loop5: detected capacity change from 0 to 8 [ 398.271465][T25526] loop0: detected capacity change from 0 to 8 01:44:25 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 398.311730][T25538] loop2: detected capacity change from 0 to 8 [ 398.319941][T25541] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 398.332423][T25542] FAULT_INJECTION: forcing a failure. [ 398.332423][T25542] name failslab, interval 1, probability 0, space 0, times 0 01:44:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0xf0ffffff7f0000) [ 398.377979][T25542] CPU: 0 PID: 25542 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 398.386779][T25542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.396893][T25542] Call Trace: [ 398.400189][T25542] dump_stack+0x137/0x19d [ 398.404558][T25542] should_fail+0x23c/0x250 [ 398.409015][T25542] ? __alloc_file+0x2e/0x1a0 [ 398.413620][T25542] __should_failslab+0x81/0x90 [ 398.418393][T25542] should_failslab+0x5/0x20 [ 398.422903][T25542] kmem_cache_alloc+0x46/0x320 [ 398.427687][T25542] ? __d_alloc+0x36/0x370 [ 398.432024][T25542] __alloc_file+0x2e/0x1a0 [ 398.436441][T25542] alloc_empty_file+0xcd/0x1c0 [ 398.441209][T25542] alloc_file+0x3a/0x280 [ 398.445463][T25542] alloc_file_pseudo+0xe2/0x130 [ 398.450346][T25542] __shmem_file_setup+0x14c/0x1d0 [ 398.455415][T25542] shmem_file_setup+0x37/0x40 [ 398.460119][T25542] __se_sys_memfd_create+0x1eb/0x390 [ 398.465446][T25542] __x64_sys_memfd_create+0x2d/0x40 [ 398.470649][T25542] do_syscall_64+0x39/0x80 01:44:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0xffffffffffffffff) [ 398.475104][T25542] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 398.481087][T25542] RIP: 0033:0x466459 [ 398.484979][T25542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 398.504650][T25542] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 398.513057][T25542] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 01:44:26 executing program 0: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 398.521024][T25542] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 398.529002][T25542] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 398.536974][T25542] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 398.544945][T25542] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 01:44:26 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 398.579845][T25549] loop5: detected capacity change from 0 to 8 01:44:26 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) 01:44:26 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 398.663916][T25549] MINIX-fs: bad superblock or unable to read bitmaps [ 398.686070][T25563] loop0: detected capacity change from 0 to 8 [ 398.742438][T25541] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.761680][T25567] FAULT_INJECTION: forcing a failure. [ 398.761680][T25567] name failslab, interval 1, probability 0, space 0, times 0 [ 398.783801][T25549] loop5: detected capacity change from 0 to 8 [ 398.790952][T25549] MINIX-fs: bad superblock or unable to read bitmaps [ 398.815414][T25574] loop2: detected capacity change from 0 to 8 [ 398.841003][T25567] CPU: 1 PID: 25567 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 398.849799][T25567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.859874][T25567] Call Trace: [ 398.863172][T25567] dump_stack+0x137/0x19d [ 398.867509][T25567] should_fail+0x23c/0x250 [ 398.872068][T25567] ? security_file_alloc+0x30/0x190 [ 398.877300][T25567] __should_failslab+0x81/0x90 [ 398.882061][T25567] should_failslab+0x5/0x20 [ 398.886589][T25567] kmem_cache_alloc+0x46/0x320 [ 398.891395][T25567] ? __alloc_file+0x2e/0x1a0 [ 398.896039][T25567] security_file_alloc+0x30/0x190 [ 398.901067][T25567] __alloc_file+0x83/0x1a0 [ 398.905549][T25567] alloc_empty_file+0xcd/0x1c0 [ 398.910311][T25567] alloc_file+0x3a/0x280 [ 398.914553][T25567] alloc_file_pseudo+0xe2/0x130 [ 398.919448][T25567] __shmem_file_setup+0x14c/0x1d0 [ 398.924556][T25567] shmem_file_setup+0x37/0x40 [ 398.929318][T25567] __se_sys_memfd_create+0x1eb/0x390 [ 398.934694][T25567] __x64_sys_memfd_create+0x2d/0x40 [ 398.939897][T25567] do_syscall_64+0x39/0x80 [ 398.944322][T25567] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 398.950232][T25567] RIP: 0033:0x466459 [ 398.954122][T25567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 398.973725][T25567] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 398.982145][T25567] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 398.990114][T25567] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004beba8 [ 398.998085][T25567] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 399.006054][T25567] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 01:44:26 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:26 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 399.014027][T25567] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020011500 [ 399.024756][T25541] device bridge_slave_1 left promiscuous mode [ 399.031616][T25580] loop0: detected capacity change from 0 to 8 [ 399.041026][T25541] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.123641][T25596] loop2: detected capacity change from 0 to 8 01:44:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) 01:44:26 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) signalfd(r3, &(0x7f0000000040)={[0x7ff]}, 0x8) dup2(r0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x5e) 01:44:26 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:26 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:26 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 399.168747][T25600] loop5: detected capacity change from 0 to 8 [ 399.176858][T25600] MINIX-fs: bad superblock or unable to read bitmaps [ 399.227462][T25608] FAULT_INJECTION: forcing a failure. [ 399.227462][T25608] name failslab, interval 1, probability 0, space 0, times 0 [ 399.246978][T25608] CPU: 0 PID: 25608 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 399.255755][T25608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.265807][T25608] Call Trace: [ 399.269157][T25608] dump_stack+0x137/0x19d [ 399.273493][T25608] should_fail+0x23c/0x250 [ 399.277915][T25608] __should_failslab+0x81/0x90 [ 399.282684][T25608] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 399.288484][T25608] should_failslab+0x5/0x20 [ 399.293067][T25608] __kmalloc+0x66/0x380 [ 399.297322][T25608] ? __alloc_pages_nodemask+0x1a8/0x350 [ 399.302879][T25608] tomoyo_realpath_from_path+0x98/0x3b0 [ 399.308465][T25608] tomoyo_path_perm+0xc6/0x330 [ 399.313245][T25608] ? security_file_alloc+0x30/0x190 [ 399.318490][T25608] tomoyo_path_truncate+0x18/0x20 [ 399.323532][T25608] security_path_truncate+0x7f/0xd0 [ 399.328818][T25608] do_sys_ftruncate+0x378/0x540 [ 399.333941][T25608] ? kfree+0xf0/0x1e0 [ 399.337926][T25608] ? fpregs_assert_state_consistent+0x7d/0x90 [ 399.344093][T25608] __x64_sys_ftruncate+0x2f/0x40 [ 399.349044][T25608] do_syscall_64+0x39/0x80 [ 399.353533][T25608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 399.359441][T25608] RIP: 0033:0x466417 01:44:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) [ 399.363329][T25608] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 399.382998][T25608] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 399.391428][T25608] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466417 [ 399.399475][T25608] RDX: 0000000000000800 RSI: 0000000000000800 RDI: 0000000000000004 [ 399.407477][T25608] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 399.415449][T25608] R10: 0000000000000001 R11: 0000000000000217 R12: 0000000000000004 01:44:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x80000000, 0xab3a, "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", 0x0, 0x4, 0x20, 0x25, 0x5, 0x80, 0x81}}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r2, 0x0, r4, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r2, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r5, 0x0, 0x2, 0x4}}, 0x20) [ 399.423426][T25608] R13: 0000000000000004 R14: 0000000000000800 R15: 0000000020011500 [ 399.440452][T25611] loop0: detected capacity change from 0 to 8 [ 399.450520][T25608] ERROR: Out of memory at tomoyo_realpath_from_path. [ 399.462468][T25600] loop5: detected capacity change from 0 to 8 [ 399.471551][T25613] loop2: detected capacity change from 0 to 8 01:44:27 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 399.471919][T25600] MINIX-fs: bad superblock or unable to read bitmaps [ 399.485110][T25608] loop1: detected capacity change from 0 to 4 [ 399.496751][T25608] MINIX-fs: bad superblock or unable to read bitmaps 01:44:27 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:27 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) 01:44:27 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 399.616065][T25640] loop5: detected capacity change from 0 to 8 [ 399.641256][T25640] MINIX-fs: bad superblock or unable to read bitmaps [ 399.659137][T25647] FAULT_INJECTION: forcing a failure. 01:44:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r1) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 399.659137][T25647] name failslab, interval 1, probability 0, space 0, times 0 [ 399.668655][T25648] loop0: detected capacity change from 0 to 8 [ 399.681679][T25653] loop2: detected capacity change from 0 to 8 [ 399.690811][T25647] CPU: 1 PID: 25647 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 399.699591][T25647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.709762][T25647] Call Trace: [ 399.713171][T25647] dump_stack+0x137/0x19d [ 399.717514][T25647] should_fail+0x23c/0x250 [ 399.721926][T25647] __should_failslab+0x81/0x90 [ 399.726683][T25647] ? tomoyo_encode2+0x1d3/0x350 [ 399.731535][T25647] should_failslab+0x5/0x20 [ 399.736037][T25647] __kmalloc+0x66/0x380 [ 399.740187][T25647] tomoyo_encode2+0x1d3/0x350 [ 399.744984][T25647] ? dynamic_dname+0xf0/0xf0 [ 399.749572][T25647] tomoyo_realpath_from_path+0x35e/0x3b0 [ 399.755205][T25647] tomoyo_path_perm+0xc6/0x330 [ 399.759965][T25647] ? security_file_alloc+0x30/0x190 [ 399.765192][T25647] tomoyo_path_truncate+0x18/0x20 [ 399.770216][T25647] security_path_truncate+0x7f/0xd0 [ 399.775456][T25647] do_sys_ftruncate+0x378/0x540 [ 399.780308][T25647] ? kfree+0xf0/0x1e0 [ 399.784295][T25647] ? fpregs_assert_state_consistent+0x7d/0x90 [ 399.790375][T25647] __x64_sys_ftruncate+0x2f/0x40 [ 399.795423][T25647] do_syscall_64+0x39/0x80 [ 399.799848][T25647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 399.805742][T25647] RIP: 0033:0x466417 [ 399.809728][T25647] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 399.829382][T25647] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 399.837852][T25647] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466417 [ 399.845820][T25647] RDX: 0000000000000800 RSI: 0000000000000800 RDI: 0000000000000004 [ 399.853785][T25647] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 399.861748][T25647] R10: 0000000000000001 R11: 0000000000000217 R12: 0000000000000004 [ 399.869716][T25647] R13: 0000000000000004 R14: 0000000000000800 R15: 0000000020011500 01:44:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) [ 399.909267][T25647] ERROR: Out of memory at tomoyo_realpath_from_path. [ 399.932746][T25647] loop1: detected capacity change from 0 to 4 [ 399.948935][T25647] MINIX-fs: bad superblock or unable to read bitmaps 01:44:27 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:27 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[]) 01:44:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 399.959758][T25640] loop5: detected capacity change from 0 to 8 [ 399.996708][T25640] MINIX-fs: bad superblock or unable to read bitmaps 01:44:27 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:27 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='big_key\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:27 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:27 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[]) 01:44:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) [ 400.202987][T25683] loop5: detected capacity change from 0 to 8 [ 400.225591][T25687] FAULT_INJECTION: forcing a failure. [ 400.225591][T25687] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 400.270677][T25683] MINIX-fs: bad superblock or unable to read bitmaps [ 400.275032][T25687] CPU: 0 PID: 25687 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 400.286217][T25687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.296347][T25687] Call Trace: [ 400.299645][T25687] dump_stack+0x137/0x19d [ 400.303985][T25687] should_fail+0x23c/0x250 [ 400.308425][T25687] __alloc_pages_nodemask+0xea/0x350 [ 400.313717][T25687] alloc_pages_vma+0x3e6/0x890 [ 400.318565][T25687] shmem_alloc_and_acct_page+0x2ba/0x640 [ 400.324290][T25687] shmem_getpage_gfp+0x6c6/0x1980 [ 400.329412][T25687] shmem_write_begin+0x83/0x100 [ 400.334270][T25687] generic_perform_write+0x196/0x3a0 [ 400.339599][T25687] ? file_update_time+0x1bd/0x3e0 [ 400.344684][T25687] __generic_file_write_iter+0x15c/0x340 [ 400.350323][T25687] ? generic_write_checks+0x250/0x290 [ 400.355729][T25687] generic_file_write_iter+0x75/0x130 [ 400.361110][T25687] vfs_write+0x6f9/0x7e0 [ 400.365394][T25687] __x64_sys_pwrite64+0xf5/0x150 [ 400.370340][T25687] do_syscall_64+0x39/0x80 [ 400.374793][T25687] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 400.380693][T25687] RIP: 0033:0x4195f7 [ 400.384586][T25687] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 400.404206][T25687] RSP: 002b:00007f50ffcfdf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 400.412632][T25687] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 01:44:28 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:28 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011500)=ANY=[]) 01:44:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) 01:44:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) kcmp(r1, r2, 0x2, r0, r3) [ 400.420623][T25687] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000004 [ 400.428618][T25687] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 400.436635][T25687] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 400.444611][T25687] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:44:28 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 400.492751][T25683] loop5: detected capacity change from 0 to 8 [ 400.507461][T25683] MINIX-fs: bad superblock or unable to read bitmaps [ 400.530036][T25687] loop1: detected capacity change from 0 to 4 [ 400.540297][T25687] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:44:28 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:28 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:28 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r4) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f00000007c0), r2, 0x1}}, 0x18) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r3) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="89502faede852e43cfd23bd095b5d3269ff630a5f7350aae56372d99f22d03449e9f4b27e5fb16a5f185f12a293f1809a3078ef4f542c766098485becae796c95f6a2e77e42a965abf3072066c098ad919436a68220780c56fb75f7476e610e95b67379eae150df663064f0518b70554bc264191863f7c6f48668b1c41c10f8f5783b987eddd5b523b8d0bd30dc0f445a86d0afd5e65ff8996631a4e6d934f161afb", 0xa2, r3) 01:44:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) [ 400.639186][T25719] loop2: detected capacity change from 0 to 4 [ 400.672147][T25719] MINIX-fs: bad superblock or unable to read bitmaps [ 400.698709][T25725] loop0: detected capacity change from 0 to 4 [ 400.710628][T25731] FAULT_INJECTION: forcing a failure. [ 400.710628][T25731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.723830][T25731] CPU: 1 PID: 25731 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 400.732594][T25731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.742654][T25731] Call Trace: [ 400.745933][T25731] dump_stack+0x137/0x19d [ 400.750267][T25731] should_fail+0x23c/0x250 [ 400.751428][T25733] loop5: detected capacity change from 0 to 8 [ 400.754689][T25731] should_fail_usercopy+0x16/0x20 [ 400.765811][T25731] iov_iter_copy_from_user_atomic+0x2d6/0x830 [ 400.771944][T25731] ? shmem_write_begin+0x83/0x100 [ 400.776967][T25731] generic_perform_write+0x1e4/0x3a0 [ 400.782248][T25731] ? file_update_time+0x1bd/0x3e0 [ 400.787276][T25731] __generic_file_write_iter+0x15c/0x340 [ 400.792904][T25731] ? generic_write_checks+0x250/0x290 [ 400.798268][T25731] generic_file_write_iter+0x75/0x130 [ 400.803640][T25731] vfs_write+0x6f9/0x7e0 [ 400.807959][T25731] __x64_sys_pwrite64+0xf5/0x150 [ 400.812900][T25731] do_syscall_64+0x39/0x80 [ 400.817312][T25731] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 400.823209][T25731] RIP: 0033:0x4195f7 [ 400.827096][T25731] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 400.846700][T25731] RSP: 002b:00007f50ffcfdf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 400.855125][T25731] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 00000000004195f7 [ 400.863167][T25731] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000004 [ 400.871165][T25731] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 400.879183][T25731] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 400.887239][T25731] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:44:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0x8}}, 0x20) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x92e27517fe2c3b97, 0x0, @in6={0xa, 0x4e21, 0x800000, @private1={0xfc, 0x1, [], 0x1}, 0xc43}}}, 0x90) [ 400.903946][T25725] MINIX-fs: bad superblock or unable to read bitmaps [ 400.919559][T25733] MINIX-fs: bad superblock or unable to read bitmaps 01:44:28 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 400.944843][T25731] loop1: detected capacity change from 0 to 4 01:44:28 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:28 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.003364][T25731] MINIX-fs: bad superblock or unable to read bitmaps [ 401.021520][T25733] loop5: detected capacity change from 0 to 8 [ 401.028666][T25733] MINIX-fs: bad superblock or unable to read bitmaps 01:44:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:28 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.100685][T25753] loop2: detected capacity change from 0 to 4 [ 401.119463][T25753] MINIX-fs: bad superblock or unable to read bitmaps [ 401.136769][T25764] FAULT_INJECTION: forcing a failure. [ 401.136769][T25764] name failslab, interval 1, probability 0, space 0, times 0 [ 401.149946][T25764] CPU: 0 PID: 25764 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 401.158820][T25764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.169563][T25764] Call Trace: [ 401.172838][T25764] dump_stack+0x137/0x19d [ 401.177177][T25764] should_fail+0x23c/0x250 [ 401.181622][T25764] ? getname_flags+0x84/0x3d0 [ 401.186305][T25764] __should_failslab+0x81/0x90 [ 401.191106][T25764] should_failslab+0x5/0x20 [ 401.195637][T25764] kmem_cache_alloc+0x46/0x320 [ 401.200405][T25764] getname_flags+0x84/0x3d0 [ 401.204908][T25764] ? vfs_write+0x572/0x7e0 [ 401.209332][T25764] getname+0x15/0x20 [ 401.213227][T25764] do_sys_openat2+0x5b/0x250 [ 401.217853][T25764] __x64_sys_openat+0xef/0x110 [ 401.222626][T25764] do_syscall_64+0x39/0x80 [ 401.227055][T25764] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 401.232983][T25764] RIP: 0033:0x419544 [ 401.236878][T25764] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 401.256922][T25764] RSP: 002b:00007f50ffcfded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 401.265351][T25764] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 401.273466][T25764] RDX: 0000000000000002 RSI: 00007f50ffcfe000 RDI: 00000000ffffff9c [ 401.281529][T25764] RBP: 00007f50ffcfe000 R08: 0000000000000000 R09: ffffffffffffffff [ 401.289499][T25764] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 01:44:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) r4 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r4, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000040)={0x1, 0x10}, 0x18) creat(&(0x7f0000000140)='./file0\x00', 0xca) request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="dd19c239241beb20cf59453b9e769f35eabe5a70ed41285528d4c604e07346108ec420231c3fb4acba688a4e3d6b4f0d5236a7154f7864e04bf81b92d866b71b377b90c648f7755b7c3fd7dfa4205b1d48cc74fb057fc729aaf7719fe8e6c25e9915b7ae168b96a4e3755d1976164249fb4bea6cfb2efde8cc78cb2275607d482f2191c263", 0x85, 0xfffffffffffffffd) 01:44:29 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 401.297471][T25764] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 401.305921][T25762] loop5: detected capacity change from 0 to 8 [ 401.327148][T25766] loop0: detected capacity change from 0 to 4 [ 401.335383][T25762] MINIX-fs: bad superblock or unable to read bitmaps 01:44:29 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.358824][T25766] MINIX-fs: bad superblock or unable to read bitmaps [ 401.384528][T25762] loop5: detected capacity change from 0 to 8 01:44:29 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.416227][T25777] loop2: detected capacity change from 0 to 4 [ 401.422399][T25762] MINIX-fs: bad superblock or unable to read bitmaps [ 401.439968][T25777] MINIX-fs: bad superblock or unable to read bitmaps [ 401.465609][T25785] FAULT_INJECTION: forcing a failure. [ 401.465609][T25785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 401.499039][T25785] CPU: 1 PID: 25785 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 401.507827][T25785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.517883][T25785] Call Trace: [ 401.521302][T25785] dump_stack+0x137/0x19d [ 401.525700][T25785] should_fail+0x23c/0x250 [ 401.530114][T25785] should_fail_usercopy+0x16/0x20 [ 401.535133][T25785] strncpy_from_user+0x21/0x250 [ 401.539978][T25785] getname_flags+0xb8/0x3d0 [ 401.544492][T25785] ? vfs_write+0x572/0x7e0 [ 401.548908][T25785] getname+0x15/0x20 [ 401.552895][T25785] do_sys_openat2+0x5b/0x250 [ 401.558355][T25785] __x64_sys_openat+0xef/0x110 [ 401.563146][T25785] do_syscall_64+0x39/0x80 [ 401.567560][T25785] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 401.573471][T25785] RIP: 0033:0x419544 [ 401.577374][T25785] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 401.597035][T25785] RSP: 002b:00007f50ffcfded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 401.605457][T25785] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 401.613442][T25785] RDX: 0000000000000002 RSI: 00007f50ffcfe000 RDI: 00000000ffffff9c [ 401.621410][T25785] RBP: 00007f50ffcfe000 R08: 0000000000000000 R09: ffffffffffffffff [ 401.629385][T25785] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 401.637960][T25785] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:44:29 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) [ 401.662482][T25787] loop0: detected capacity change from 0 to 4 [ 401.676565][T25787] MINIX-fs: bad superblock or unable to read bitmaps 01:44:29 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.715904][T25796] loop2: detected capacity change from 0 to 4 [ 401.724909][T25796] MINIX-fs: bad superblock or unable to read bitmaps 01:44:29 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x4, "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", 0x8, 0x48, 0x40, 0x7, 0xb0, 0x0, 0x1, 0x1}, r5}}, 0x128) 01:44:29 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.809224][T25801] loop0: detected capacity change from 0 to 4 [ 401.840578][T25801] MINIX-fs: bad superblock or unable to read bitmaps 01:44:29 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:29 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 401.913629][T25811] loop2: detected capacity change from 0 to 4 [ 401.930700][T25811] MINIX-fs: bad superblock or unable to read bitmaps [ 401.965667][T25816] loop5: detected capacity change from 0 to 8 [ 401.973821][T25816] MINIX-fs: bad superblock or unable to read bitmaps [ 402.000591][T25825] FAULT_INJECTION: forcing a failure. [ 402.000591][T25825] name failslab, interval 1, probability 0, space 0, times 0 01:44:29 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb03334a96982406fb488dbb7513b1a9e47215a9b88d95b941002216f50c2ac0ea14a5be5d613944140c16c85b0c", 0x57, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 402.013356][T25816] loop5: detected capacity change from 0 to 8 [ 402.020473][T25816] MINIX-fs: bad superblock or unable to read bitmaps [ 402.031517][T25823] loop0: detected capacity change from 0 to 4 [ 402.040316][T25823] MINIX-fs: bad superblock or unable to read bitmaps [ 402.048669][T25825] CPU: 0 PID: 25825 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 402.057451][T25825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.067513][T25825] Call Trace: [ 402.070790][T25825] dump_stack+0x137/0x19d [ 402.075171][T25825] should_fail+0x23c/0x250 [ 402.079651][T25825] ? __alloc_file+0x2e/0x1a0 [ 402.084251][T25825] __should_failslab+0x81/0x90 [ 402.089038][T25825] should_failslab+0x5/0x20 [ 402.093638][T25825] kmem_cache_alloc+0x46/0x320 [ 402.098402][T25825] __alloc_file+0x2e/0x1a0 [ 402.102828][T25825] alloc_empty_file+0xcd/0x1c0 [ 402.107668][T25825] path_openat+0x65/0x21b0 [ 402.112118][T25825] ? iov_iter_advance+0x1eb/0xa40 [ 402.117222][T25825] ? balance_dirty_pages_ratelimited+0xce/0x8b0 [ 402.123497][T25825] ? generic_perform_write+0x332/0x3a0 [ 402.128962][T25825] do_filp_open+0xbd/0x1d0 [ 402.133385][T25825] ? expand_files+0x55/0x520 [ 402.137985][T25825] ? __virt_addr_valid+0x15a/0x1a0 [ 402.143105][T25825] ? __check_object_size+0x253/0x310 [ 402.148403][T25825] ? _raw_spin_unlock+0x22/0x40 [ 402.154397][T25825] ? alloc_fd+0x35d/0x3b0 [ 402.158795][T25825] do_sys_openat2+0xa3/0x250 01:44:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) fadvise64(r0, 0xd0, 0x3, 0x3) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r1) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r2, 0x0, r4, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r2, r3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) splice(r5, 0x0, r7, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r5, r6) write$RDMA_USER_CM_CMD_SET_OPTION(r5, 0x0, 0x0) [ 402.163401][T25825] __x64_sys_openat+0xef/0x110 [ 402.168220][T25825] do_syscall_64+0x39/0x80 [ 402.172669][T25825] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 402.178579][T25825] RIP: 0033:0x419544 [ 402.182475][T25825] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 402.202118][T25825] RSP: 002b:00007f50ffcfded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 01:44:29 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 402.210670][T25825] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 402.218646][T25825] RDX: 0000000000000002 RSI: 00007f50ffcfe000 RDI: 00000000ffffff9c [ 402.226685][T25825] RBP: 00007f50ffcfe000 R08: 0000000000000000 R09: ffffffffffffffff [ 402.234662][T25825] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 402.242656][T25825] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 402.259346][T25831] loop2: detected capacity change from 0 to 4 01:44:29 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:30 executing program 3: r0 = fanotify_init(0x8, 0x40000) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x1000, 0x0, 0x3, 0x3f, 0x229}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x424f2f12276c6aa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$FBIOGETCMAP(r2, 0x4604, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) [ 402.384764][T25831] MINIX-fs: bad superblock or unable to read bitmaps [ 402.391816][T25846] loop0: detected capacity change from 0 to 4 [ 402.430873][T25849] loop5: detected capacity change from 0 to 8 [ 402.440517][T25846] MINIX-fs: bad superblock or unable to read bitmaps [ 402.450700][T25849] MINIX-fs: bad superblock or unable to read bitmaps 01:44:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) 01:44:30 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:30 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:30 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200001, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x401, 0x5, 0x1}) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x111042, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000040)={0x7fffffff, 0x94e, 0x3, 0x3, 0xf4e, 0x49, 0x1f}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:30 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:30 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 402.528362][T25849] loop5: detected capacity change from 0 to 8 [ 402.558196][T25849] MINIX-fs: bad superblock or unable to read bitmaps [ 402.621989][T25866] loop2: detected capacity change from 0 to 8 [ 402.655466][T25866] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 402.712429][T25875] FAULT_INJECTION: forcing a failure. [ 402.712429][T25875] name failslab, interval 1, probability 0, space 0, times 0 [ 402.751372][T25880] loop5: detected capacity change from 0 to 8 [ 402.791024][T25875] CPU: 0 PID: 25875 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 402.799848][T25875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.809909][T25875] Call Trace: [ 402.813199][T25875] dump_stack+0x137/0x19d [ 402.817618][T25875] should_fail+0x23c/0x250 [ 402.822030][T25875] ? security_file_alloc+0x30/0x190 [ 402.827230][T25875] __should_failslab+0x81/0x90 [ 402.831989][T25875] should_failslab+0x5/0x20 [ 402.836498][T25875] kmem_cache_alloc+0x46/0x320 [ 402.841277][T25875] ? __alloc_file+0x2e/0x1a0 [ 402.845868][T25875] security_file_alloc+0x30/0x190 [ 402.850956][T25875] __alloc_file+0x83/0x1a0 [ 402.855453][T25875] alloc_empty_file+0xcd/0x1c0 [ 402.860228][T25875] path_openat+0x65/0x21b0 [ 402.864641][T25875] ? iov_iter_advance+0x1eb/0xa40 [ 402.870107][T25875] ? balance_dirty_pages_ratelimited+0xce/0x8b0 [ 402.876427][T25875] ? generic_perform_write+0x332/0x3a0 [ 402.881969][T25875] do_filp_open+0xbd/0x1d0 [ 402.886384][T25875] ? expand_files+0x55/0x520 [ 402.891045][T25875] ? __virt_addr_valid+0x15a/0x1a0 [ 402.896158][T25875] ? __check_object_size+0x253/0x310 [ 402.901440][T25875] ? _raw_spin_unlock+0x22/0x40 [ 402.906310][T25875] ? alloc_fd+0x35d/0x3b0 [ 402.910913][T25875] do_sys_openat2+0xa3/0x250 [ 402.915503][T25875] __x64_sys_openat+0xef/0x110 [ 402.920271][T25875] do_syscall_64+0x39/0x80 [ 402.925013][T25875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 402.930908][T25875] RIP: 0033:0x419544 [ 402.934839][T25875] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 402.954445][T25875] RSP: 002b:00007f50ffcfded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 402.962968][T25875] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 402.970955][T25875] RDX: 0000000000000002 RSI: 00007f50ffcfe000 RDI: 00000000ffffff9c [ 402.978941][T25875] RBP: 00007f50ffcfe000 R08: 0000000000000000 R09: ffffffffffffffff 01:44:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x703941, 0x0) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r3) r4 = add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)="c6dca53bc97f2a9644693f281bfce1922eb2fe424933ba5bfa8256d1f3c4d7f6ee10f208a0ee2b62add550462e8a432ef60a26c456522ccfa3d4800199105e17bca9148ae5fe9f0980f386f37a178bb4ca41bb59340484a0956cbdcd96487f49e6e6a8f49d51cd2de7e3c0d3cea335f6b2c58bb2ae2fbb39f39ecd555346baaab1467ef08c51187e3f48e51c", 0x39, r3) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r4) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) [ 402.986912][T25875] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 402.994924][T25875] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 403.011832][T25882] loop0: detected capacity change from 0 to 8 01:44:30 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 403.108100][T25880] MINIX-fs: bad superblock or unable to read bitmaps [ 403.147056][T25882] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:30 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x5}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:30 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='id_legacy\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 403.229245][T25894] FAULT_INJECTION: forcing a failure. [ 403.229245][T25894] name failslab, interval 1, probability 0, space 0, times 0 [ 403.296857][T25894] CPU: 1 PID: 25894 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 403.305685][T25894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.315258][T25904] loop5: detected capacity change from 0 to 8 [ 403.315739][T25894] Call Trace: [ 403.315750][T25894] dump_stack+0x137/0x19d [ 403.329611][T25894] should_fail+0x23c/0x250 [ 403.334141][T25894] __should_failslab+0x81/0x90 [ 403.336345][T25904] MINIX-fs: bad superblock or unable to read bitmaps [ 403.341686][T25894] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 403.341717][T25894] should_failslab+0x5/0x20 [ 403.358721][T25894] __kmalloc+0x66/0x380 [ 403.362897][T25894] ? sched_clock_cpu+0x11/0x1a0 [ 403.367858][T25894] tomoyo_realpath_from_path+0x98/0x3b0 [ 403.373418][T25894] tomoyo_check_open_permission+0xaf/0x370 [ 403.379304][T25894] ? sysvec_apic_timer_interrupt+0x43/0x80 [ 403.385151][T25894] tomoyo_file_open+0xd3/0xf0 [ 403.389835][T25894] security_file_open+0x3f/0x90 [ 403.394763][T25894] do_dentry_open+0x22d/0x890 [ 403.399481][T25894] vfs_open+0x43/0x50 [ 403.403467][T25894] path_openat+0x1982/0x21b0 [ 403.408076][T25894] do_filp_open+0xbd/0x1d0 [ 403.412492][T25894] ? _raw_spin_unlock+0x22/0x40 [ 403.417452][T25894] ? alloc_fd+0x35d/0x3b0 [ 403.421900][T25894] do_sys_openat2+0xa3/0x250 [ 403.426549][T25894] __x64_sys_openat+0xef/0x110 [ 403.431373][T25894] do_syscall_64+0x39/0x80 [ 403.435800][T25894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 403.441728][T25894] RIP: 0033:0x419544 [ 403.445687][T25894] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 403.465367][T25894] RSP: 002b:00007f50ffcfded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 403.473822][T25894] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 403.481812][T25894] RDX: 0000000000000002 RSI: 00007f50ffcfe000 RDI: 00000000ffffff9c [ 403.489788][T25894] RBP: 00007f50ffcfe000 R08: 0000000000000000 R09: ffffffffffffffff [ 403.497756][T25894] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 403.505839][T25894] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:44:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) 01:44:31 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 403.538262][T25900] loop2: detected capacity change from 0 to 8 [ 403.574871][T25894] ERROR: Out of memory at tomoyo_realpath_from_path. [ 403.582422][T25904] loop5: detected capacity change from 0 to 8 01:44:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5, @remote, 0xff}}}, 0x30) r1 = request_key(&(0x7f0000000480)='.dead\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x6}}, 0x20) keyctl$update(0x2, r1, &(0x7f0000000200)="5ed99a7a196682c2d688c57e0eef13d9aa1b78bc974ce7df7d55b7f431accefc19de8d886fa649679f419ae248d2f97ed2133a29a981757ce049dde5c88acc8ff95b38bec7edde", 0x47) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4100, 0x0) r3 = signalfd4(r2, &(0x7f00000001c0)={[0x2]}, 0x8, 0x40800) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x12, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0xfffffe4f, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 403.621799][T25900] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 403.646007][T25904] MINIX-fs: bad superblock or unable to read bitmaps [ 403.667301][T25894] loop1: detected capacity change from 0 to 4 [ 403.685092][T25921] loop0: detected capacity change from 0 to 8 [ 403.709511][T25894] MINIX-fs: bad superblock or unable to read bitmaps 01:44:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) 01:44:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f, 0x9}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 403.724819][T25921] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:31 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:31 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 403.849204][T25933] loop2: detected capacity change from 0 to 8 01:44:31 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) 01:44:31 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r1, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 403.898379][T25933] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:31 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 404.000721][T25942] loop5: detected capacity change from 0 to 8 [ 404.013108][T25948] FAULT_INJECTION: forcing a failure. [ 404.013108][T25948] name failslab, interval 1, probability 0, space 0, times 0 [ 404.026113][T25948] CPU: 1 PID: 25948 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 404.034893][T25948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.044947][T25948] Call Trace: 01:44:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 404.048223][T25948] dump_stack+0x137/0x19d [ 404.052597][T25948] should_fail+0x23c/0x250 [ 404.057153][T25948] __should_failslab+0x81/0x90 [ 404.061923][T25948] ? tomoyo_encode2+0x1d3/0x350 [ 404.066854][T25948] should_failslab+0x5/0x20 [ 404.071454][T25948] __kmalloc+0x66/0x380 [ 404.075624][T25948] tomoyo_encode2+0x1d3/0x350 [ 404.080319][T25948] tomoyo_realpath_from_path+0x35e/0x3b0 [ 404.086112][T25948] tomoyo_check_open_permission+0xaf/0x370 [ 404.091944][T25948] tomoyo_file_open+0xd3/0xf0 [ 404.096886][T25948] security_file_open+0x3f/0x90 [ 404.101967][T25948] do_dentry_open+0x22d/0x890 [ 404.106680][T25948] vfs_open+0x43/0x50 [ 404.109420][T25952] loop0: detected capacity change from 0 to 8 [ 404.110691][T25948] path_openat+0x1982/0x21b0 [ 404.110726][T25948] do_filp_open+0xbd/0x1d0 [ 404.125929][T25948] ? _raw_spin_unlock+0x22/0x40 [ 404.130791][T25948] ? alloc_fd+0x35d/0x3b0 [ 404.135131][T25948] do_sys_openat2+0xa3/0x250 [ 404.140421][T25948] __x64_sys_openat+0xef/0x110 [ 404.143135][T25956] loop2: detected capacity change from 0 to 8 01:44:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r1, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 404.145227][T25948] do_syscall_64+0x39/0x80 [ 404.145329][T25948] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 404.153041][T25952] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 404.156051][T25948] RIP: 0033:0x419544 [ 404.156069][T25948] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 404.193456][T25948] RSP: 002b:00007f50ffcfded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 404.201877][T25948] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000419544 [ 404.209856][T25948] RDX: 0000000000000002 RSI: 00007f50ffcfe000 RDI: 00000000ffffff9c [ 404.217427][T25956] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 404.217839][T25948] RBP: 00007f50ffcfe000 R08: 0000000000000000 R09: ffffffffffffffff [ 404.217855][T25948] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 404.238402][T25942] MINIX-fs: bad superblock or unable to read bitmaps [ 404.241668][T25948] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:44:31 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:31 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00', r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r3) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000380)="c162ba2e6c5e0bf54d7f36e8d1775a25c7d5a533ee846c80d0c068e832b0866481f6c7ac3697a1a84be3ba1813cac1aaa983bba2132745c509d0d01b7241c3a8f5c2310aca17746ad250160fdb9ecd1ea1cfc06fb0e87e2a92157b0e9b0d042bca7902d0a268b065975b2ea53462257d3d1ec59e48871295580d3779c3dfb0fd10b07f7bd37cd5eaed81586f7bb63064429ccb0d24c4aaec8bb4ac51164e2ba5312ad080876ec7f27cfc511b25e10c5c465bb98886056a43d784cce2fa55aa90ac811ac2663d21e58d0ac057235911", 0xcf, r3) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="5ff1367ac59030d9ece155c1b0dd4282b2121e700b0e4fd922642849375fda2733cd7ff87800c572564b9aad527bc5c22f4815b9725575456620c49f1aed1bf3364de92b593ba4b6d5aa481684625dfceab7a11380c2ba5934cc7e6888ffb62660e03893e48ac4324e1a9a6f078f6fa86572aedb584b97067b43dd23be4df3b4dbefe51e719ad84762232949fb990087411ada542d46ae8c88562618db7fdace95644864", 0xa4, r2) 01:44:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r1, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 01:44:32 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 404.363214][T25942] loop5: detected capacity change from 0 to 8 [ 404.368363][T25967] loop0: detected capacity change from 0 to 8 [ 404.373248][T25942] MINIX-fs: bad superblock or unable to read bitmaps [ 404.403153][T25948] ERROR: Out of memory at tomoyo_realpath_from_path. [ 404.411527][T25948] loop1: detected capacity change from 0 to 4 [ 404.420542][T25967] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 404.422233][T25948] MINIX-fs: bad superblock or unable to read bitmaps 01:44:32 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 404.466540][T25984] loop2: detected capacity change from 0 to 8 [ 404.483446][T25984] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:32 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:32 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) 01:44:32 executing program 3: ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000001c0)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) r5 = dup2(r1, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1000000, @ipv4={[], [], @broadcast}, 0xd6}, {0xa, 0x4e24, 0x7, @ipv4={[], [], @broadcast}, 0x2d}, r6, 0x5}}, 0x48) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x401, @mcast1, 0x331}, {0xa, 0x4e22, 0x5, @ipv4={[], [], @empty}, 0x405}, r6, 0x5}}, 0x48) 01:44:32 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:32 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 404.593186][T25998] loop0: detected capacity change from 0 to 8 [ 404.610321][T25998] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 404.617496][T26001] loop5: detected capacity change from 0 to 8 [ 404.630302][T26001] MINIX-fs: bad superblock or unable to read bitmaps 01:44:32 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) [ 404.641586][T26005] FAULT_INJECTION: forcing a failure. [ 404.641586][T26005] name failslab, interval 1, probability 0, space 0, times 0 [ 404.673925][T26008] loop2: detected capacity change from 0 to 8 [ 404.687595][T26001] loop5: detected capacity change from 0 to 8 [ 404.713345][T26001] MINIX-fs: bad superblock or unable to read bitmaps [ 404.720174][T26008] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 404.737165][T26005] CPU: 0 PID: 26005 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 404.746053][T26005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.756183][T26005] Call Trace: [ 404.759454][T26005] dump_stack+0x137/0x19d [ 404.763807][T26005] should_fail+0x23c/0x250 [ 404.768228][T26005] __should_failslab+0x81/0x90 [ 404.772998][T26005] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 404.778786][T26005] should_failslab+0x5/0x20 [ 404.783298][T26005] __kmalloc+0x66/0x380 [ 404.787455][T26005] ? path_openat+0x191f/0x21b0 [ 404.792299][T26005] tomoyo_realpath_from_path+0x98/0x3b0 [ 404.797989][T26005] tomoyo_path_number_perm+0xc1/0x2d0 [ 404.803364][T26005] ? fsnotify+0x34a/0x1190 [ 404.807789][T26005] ? kmem_cache_free+0x59/0x100 [ 404.812642][T26005] ? __rcu_read_unlock+0x5c/0x250 [ 404.817775][T26005] tomoyo_file_ioctl+0x1c/0x20 [ 404.822568][T26005] security_file_ioctl+0x45/0x90 [ 404.827585][T26005] __se_sys_ioctl+0x48/0x140 [ 404.832253][T26005] __x64_sys_ioctl+0x3f/0x50 [ 404.836882][T26005] do_syscall_64+0x39/0x80 [ 404.841311][T26005] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 404.847253][T26005] RIP: 0033:0x466217 [ 404.851153][T26005] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 404.870766][T26005] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.879179][T26005] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 404.887148][T26005] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 404.895118][T26005] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 404.903085][T26005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 404.911142][T26005] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:44:32 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8}, 0x10) 01:44:32 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:32 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:32 executing program 4: pipe(0x0) r0 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r0, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 405.040154][T26026] loop0: detected capacity change from 0 to 8 [ 405.074563][T26026] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 405.110042][T26005] ERROR: Out of memory at tomoyo_realpath_from_path. [ 405.117014][T26034] loop2: detected capacity change from 0 to 8 [ 405.135077][T26034] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 405.147587][T26005] loop1: detected capacity change from 0 to 4 01:44:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d0d51006d4bd", 0x6, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000240)="f575dee69d8b7f1db5628a061ef2f66c39310a3b823f378a11220bfc375b812dfc397b82bed530682a060be7eec083533c03b6f8a21a67eaecbed5d07d5d39ccb397ae64152661324c540693098a0e9e7ceaa2baf235789db1417d2d8dd27a0a2337a59e730ad4c786d847d371dade9fcbb375cbabb8baad1f", 0x79, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xcd, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$read(0xb, r3, &(0x7f00000000c0)=""/76, 0x4c) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r4) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000340)="d85d552e2e5e4f80e082f17b178228f8317780bf3f3359bf7834d8888547ce75b5a42e7c81fa9de7b1347b3b5f7035904cec50f4dd8540c59d853433819f1d5cdd9ffb342a5905d8da989a566e8d93a357", 0x51, r4) [ 405.163659][T26005] MINIX-fs: bad superblock or unable to read bitmaps [ 405.208706][T26045] loop5: detected capacity change from 0 to 8 [ 405.216719][T26045] MINIX-fs: bad superblock or unable to read bitmaps 01:44:32 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:32 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:32 executing program 4: pipe(0x0) r0 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r0, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 01:44:32 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:32 executing program 3: sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x140f, 0x400, 0x70bd2b, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'uverbs\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x11, 0x45, 'ib_multicast\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 405.258519][T26045] loop5: detected capacity change from 0 to 8 [ 405.269263][T26045] MINIX-fs: bad superblock or unable to read bitmaps 01:44:33 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:33 executing program 4: pipe(0x0) r0 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r0, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 405.362739][T26066] loop2: detected capacity change from 0 to 8 [ 405.375523][T26067] loop0: detected capacity change from 0 to 8 [ 405.392310][T26071] FAULT_INJECTION: forcing a failure. [ 405.392310][T26071] name failslab, interval 1, probability 0, space 0, times 0 [ 405.405161][T26066] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 405.413329][T26071] CPU: 0 PID: 26071 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 405.422117][T26071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.432325][T26071] Call Trace: [ 405.435652][T26071] dump_stack+0x137/0x19d [ 405.439991][T26071] should_fail+0x23c/0x250 [ 405.444491][T26071] __should_failslab+0x81/0x90 [ 405.449258][T26071] ? tomoyo_encode2+0x1d3/0x350 [ 405.454116][T26071] should_failslab+0x5/0x20 [ 405.458640][T26071] __kmalloc+0x66/0x380 [ 405.462802][T26071] tomoyo_encode2+0x1d3/0x350 [ 405.467554][T26071] tomoyo_realpath_from_path+0x35e/0x3b0 [ 405.473223][T26071] tomoyo_path_number_perm+0xc1/0x2d0 [ 405.478605][T26071] ? fsnotify+0x34a/0x1190 [ 405.483042][T26071] ? kmem_cache_free+0x59/0x100 [ 405.487915][T26071] ? __rcu_read_unlock+0x5c/0x250 [ 405.492948][T26071] tomoyo_file_ioctl+0x1c/0x20 [ 405.497730][T26071] security_file_ioctl+0x45/0x90 [ 405.502690][T26071] __se_sys_ioctl+0x48/0x140 [ 405.507361][T26071] __x64_sys_ioctl+0x3f/0x50 [ 405.511968][T26071] do_syscall_64+0x39/0x80 [ 405.516412][T26071] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 405.522361][T26071] RIP: 0033:0x466217 [ 405.526326][T26071] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 405.545970][T26071] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.554387][T26071] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 01:44:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x7}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}}, 0x90) 01:44:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) [ 405.562437][T26071] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 405.570501][T26071] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 405.578559][T26071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 405.586606][T26071] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 405.596588][T26071] ERROR: Out of memory at tomoyo_realpath_from_path. [ 405.598010][T26067] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:33 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) 01:44:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x17, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x5, "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", 0x1, 0x80, 0x87, 0x7, 0x20, 0x0, 0x1, 0x1}, r1}}, 0x120) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 405.626440][T26075] loop5: detected capacity change from 0 to 8 [ 405.632217][T26071] loop1: detected capacity change from 0 to 4 [ 405.641073][T26071] MINIX-fs: bad superblock or unable to read bitmaps 01:44:33 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 405.670430][T26075] MINIX-fs: bad superblock or unable to read bitmaps 01:44:33 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) 01:44:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x2}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 405.723156][T26092] loop2: detected capacity change from 0 to 8 [ 405.745695][T26075] loop5: detected capacity change from 0 to 8 [ 405.762889][T26092] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 405.796418][T26075] MINIX-fs: bad superblock or unable to read bitmaps [ 405.827380][T26106] FAULT_INJECTION: forcing a failure. [ 405.827380][T26106] name failslab, interval 1, probability 0, space 0, times 0 01:44:33 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be2f54dce961d7caaa27d9d95e8cb68f8baf7ebb0333", 0x2c, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 405.943685][T26106] CPU: 1 PID: 26106 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 405.952495][T26106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.962583][T26106] Call Trace: [ 405.965901][T26106] dump_stack+0x137/0x19d [ 405.970389][T26106] should_fail+0x23c/0x250 [ 405.974838][T26106] ? loop_set_status_from_info+0x3a0/0x3a0 [ 405.980664][T26106] __should_failslab+0x81/0x90 [ 405.985582][T26106] ? __kthread_create_on_node+0x7a/0x270 [ 405.991279][T26106] should_failslab+0x5/0x20 [ 405.995887][T26106] kmem_cache_alloc_trace+0x49/0x340 [ 406.001287][T26106] ? find_inode_fast+0x223/0x250 [ 406.006324][T26106] ? loop_set_status_from_info+0x3a0/0x3a0 [ 406.012164][T26106] __kthread_create_on_node+0x7a/0x270 [ 406.017720][T26106] ? loop_set_status_from_info+0x3a0/0x3a0 [ 406.023538][T26106] kthread_create_on_node+0x72/0xa0 [ 406.028819][T26106] loop_configure+0x597/0xcb0 [ 406.033504][T26106] lo_ioctl+0x555/0x11f0 [ 406.037798][T26106] ? ___cache_free+0x3c/0x2f0 [ 406.042622][T26106] ? blkdev_common_ioctl+0xa36/0x10a0 [ 406.048011][T26106] ? lo_release+0x120/0x120 [ 406.052976][T26106] blkdev_ioctl+0x1d0/0x3c0 [ 406.057489][T26106] block_ioctl+0x6d/0x80 [ 406.061749][T26106] ? blkdev_iopoll+0x70/0x70 [ 406.066380][T26106] __se_sys_ioctl+0xcb/0x140 [ 406.071007][T26106] __x64_sys_ioctl+0x3f/0x50 [ 406.075613][T26106] do_syscall_64+0x39/0x80 [ 406.080038][T26106] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 406.085946][T26106] RIP: 0033:0x466217 [ 406.089875][T26106] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 406.109595][T26106] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 406.118019][T26106] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 406.125994][T26106] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 406.134022][T26106] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 406.142087][T26106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 406.150081][T26106] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:44:33 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) 01:44:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) r2 = syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x1, 0x420000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000007c0)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r3, 0x0, r5, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r3, r4) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r7}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r7}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r7}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r7, 0x10, 0x0, @ib={0x1b, 0x7, 0x10000, {"17f51df77477add324e7886ee5124a89"}, 0x80000000, 0x100000001, 0x10}}}, 0x90) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 01:44:33 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 406.198070][T26112] loop0: detected capacity change from 0 to 8 [ 406.219350][T26114] loop2: detected capacity change from 0 to 8 [ 406.225873][T26112] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 406.235789][T26114] MINIX-fs: bad superblock or unable to read bitmaps 01:44:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) [ 406.345252][T26123] FAULT_INJECTION: forcing a failure. [ 406.345252][T26123] name failslab, interval 1, probability 0, space 0, times 0 [ 406.394151][T26123] CPU: 0 PID: 26123 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 406.402984][T26123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.413043][T26123] Call Trace: [ 406.416323][T26123] dump_stack+0x137/0x19d [ 406.420664][T26123] should_fail+0x23c/0x250 [ 406.425094][T26123] ? __kernfs_new_node+0x73/0x360 [ 406.430167][T26123] __should_failslab+0x81/0x90 [ 406.434980][T26123] should_failslab+0x5/0x20 [ 406.439550][T26123] kmem_cache_alloc+0x46/0x320 [ 406.444320][T26123] ? select_idle_sibling+0x3be/0x550 [ 406.451051][T26123] __kernfs_new_node+0x73/0x360 [ 406.455907][T26123] ? rb_insert_color+0x7e/0x310 [ 406.460765][T26123] ? update_load_avg+0x1ad/0x2d0 [ 406.465791][T26123] ? rb_insert_color+0x7e/0x310 [ 406.470650][T26123] kernfs_create_dir_ns+0x5e/0x140 [ 406.475853][T26123] internal_create_group+0x138/0x850 [ 406.481150][T26123] ? check_preempt_wakeup+0x23f/0x370 [ 406.486529][T26123] sysfs_create_group+0x1b/0x20 [ 406.491387][T26123] loop_configure+0xa21/0xcb0 [ 406.496131][T26123] lo_ioctl+0x555/0x11f0 [ 406.500404][T26123] ? ___cache_free+0x3c/0x2f0 [ 406.505124][T26123] ? blkdev_common_ioctl+0xa36/0x10a0 [ 406.510611][T26123] ? lo_release+0x120/0x120 [ 406.515135][T26123] blkdev_ioctl+0x1d0/0x3c0 [ 406.519650][T26123] block_ioctl+0x6d/0x80 [ 406.523946][T26123] ? blkdev_iopoll+0x70/0x70 [ 406.528565][T26123] __se_sys_ioctl+0xcb/0x140 [ 406.533248][T26123] __x64_sys_ioctl+0x3f/0x50 [ 406.537898][T26123] do_syscall_64+0x39/0x80 [ 406.542372][T26123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 406.548278][T26123] RIP: 0033:0x466217 [ 406.552175][T26123] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 406.571884][T26123] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 406.580381][T26123] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 01:44:34 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:34 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:34 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(0xffffffffffffffff, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) [ 406.588445][T26123] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 406.596464][T26123] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 406.604431][T26123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 406.612460][T26123] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 406.624541][T26132] loop5: detected capacity change from 0 to 8 [ 406.635493][T26134] loop2: detected capacity change from 0 to 8 [ 406.637848][T26123] loop1: detected capacity change from 0 to 4 01:44:34 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) [ 406.667816][T26134] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 406.677341][T26123] MINIX-fs: bad superblock or unable to read bitmaps [ 406.679073][T26132] MINIX-fs: bad superblock or unable to read bitmaps 01:44:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @local}, 0x7}}}, 0x90) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 406.721584][T26148] loop0: detected capacity change from 0 to 8 [ 406.730587][T26148] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 406.762561][T26132] loop5: detected capacity change from 0 to 8 01:44:34 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d260006", 0x9, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:34 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 406.857698][T26132] MINIX-fs: bad superblock or unable to read bitmaps [ 406.927043][T26166] loop2: detected capacity change from 0 to 8 [ 406.944462][T26166] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 406.964521][T26168] loop0: detected capacity change from 0 to 8 01:44:34 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) 01:44:34 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:34 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 406.983043][T26168] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:34 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d260006", 0x9, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:34 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@', 0x1, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 407.048023][T26180] FAULT_INJECTION: forcing a failure. [ 407.048023][T26180] name failslab, interval 1, probability 0, space 0, times 0 [ 407.064538][T26180] CPU: 1 PID: 26180 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 407.073340][T26180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.083675][T26180] Call Trace: [ 407.087015][T26180] dump_stack+0x137/0x19d [ 407.091356][T26180] should_fail+0x23c/0x250 [ 407.095775][T26180] ? __kernfs_new_node+0x73/0x360 [ 407.096811][T26183] loop5: detected capacity change from 0 to 8 [ 407.100828][T26180] __should_failslab+0x81/0x90 [ 407.100881][T26180] should_failslab+0x5/0x20 [ 407.116158][T26180] kmem_cache_alloc+0x46/0x320 [ 407.120931][T26180] __kernfs_new_node+0x73/0x360 [ 407.125861][T26180] ? bpf_lsm_kernfs_init_security+0x5/0x10 [ 407.131677][T26180] ? security_kernfs_init_security+0x7b/0x90 [ 407.137664][T26180] ? rb_insert_color+0x7e/0x310 [ 407.142516][T26180] kernfs_new_node+0x5b/0xd0 01:44:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x9b00, @rand_addr=' \x01\x00', 0xffffffff}, {0xa, 0x4e23, 0x7fffffff, @private1={0xfc, 0x1, [], 0x1}, 0x100}}}, 0x48) 01:44:34 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, r1) [ 407.147110][T26180] __kernfs_create_file+0x45/0x1a0 [ 407.152229][T26180] sysfs_add_file_mode_ns+0x1c1/0x250 [ 407.156451][T26183] MINIX-fs: bad superblock or unable to read bitmaps [ 407.157838][T26180] internal_create_group+0x2e4/0x850 [ 407.157867][T26180] sysfs_create_group+0x1b/0x20 [ 407.174711][T26180] loop_configure+0xa21/0xcb0 [ 407.179432][T26180] lo_ioctl+0x555/0x11f0 [ 407.183783][T26180] ? ___cache_free+0x3c/0x2f0 [ 407.188558][T26180] ? blkdev_common_ioctl+0xa36/0x10a0 [ 407.194016][T26180] ? lo_release+0x120/0x120 [ 407.198518][T26180] blkdev_ioctl+0x1d0/0x3c0 [ 407.203032][T26180] block_ioctl+0x6d/0x80 [ 407.207286][T26180] ? blkdev_iopoll+0x70/0x70 [ 407.211878][T26180] __se_sys_ioctl+0xcb/0x140 [ 407.216468][T26180] __x64_sys_ioctl+0x3f/0x50 [ 407.221068][T26180] do_syscall_64+0x39/0x80 [ 407.225491][T26180] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 407.231393][T26180] RIP: 0033:0x466217 [ 407.235301][T26180] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 407.254995][T26180] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 407.263436][T26180] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 407.271402][T26180] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 407.279375][T26180] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 407.287343][T26180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 407.295366][T26180] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:44:35 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, 0x0, 0x400000000003, 0x0) dup2(r0, r1) [ 407.321351][T26191] loop0: detected capacity change from 0 to 8 [ 407.353389][T26180] loop1: detected capacity change from 0 to 4 [ 407.363968][T26180] MINIX-fs: bad superblock or unable to read bitmaps [ 407.371669][T26183] loop5: detected capacity change from 0 to 8 [ 407.379047][T26191] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 407.420667][T26197] loop2: detected capacity change from 0 to 8 [ 407.465765][T26197] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 407.475015][T26183] MINIX-fs: bad superblock or unable to read bitmaps 01:44:35 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d260006", 0x9, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:35 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:35 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:35 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f1342b632f1be", 0x17, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:35 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, 0x0, 0x400000000003, 0x0) dup2(r0, r1) 01:44:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r1, 0x6e4c79b2d5498159, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}]}, 0x24}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x14) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 407.640569][T26219] loop5: detected capacity change from 0 to 8 [ 407.683081][T26221] loop0: detected capacity change from 0 to 8 [ 407.694909][T26225] FAULT_INJECTION: forcing a failure. [ 407.694909][T26225] name failslab, interval 1, probability 0, space 0, times 0 [ 407.714389][T26225] CPU: 1 PID: 26225 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 407.723163][T26225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.733217][T26225] Call Trace: [ 407.736580][T26225] dump_stack+0x137/0x19d [ 407.740954][T26225] should_fail+0x23c/0x250 [ 407.745379][T26225] ? __kernfs_new_node+0x73/0x360 [ 407.750505][T26225] __should_failslab+0x81/0x90 [ 407.755324][T26225] should_failslab+0x5/0x20 [ 407.759956][T26225] kmem_cache_alloc+0x46/0x320 [ 407.764815][T26225] __kernfs_new_node+0x73/0x360 [ 407.769693][T26225] ? kernfs_link_sibling+0x227/0x240 [ 407.774994][T26225] ? security_kernfs_init_security+0x7b/0x90 [ 407.780990][T26225] kernfs_new_node+0x5b/0xd0 [ 407.785613][T26225] __kernfs_create_file+0x45/0x1a0 [ 407.790733][T26225] sysfs_add_file_mode_ns+0x1c1/0x250 [ 407.796168][T26225] internal_create_group+0x2e4/0x850 [ 407.801471][T26225] sysfs_create_group+0x1b/0x20 [ 407.806404][T26225] loop_configure+0xa21/0xcb0 [ 407.811230][T26225] lo_ioctl+0x555/0x11f0 [ 407.815507][T26225] ? ___cache_free+0x3c/0x2f0 [ 407.820196][T26225] ? blkdev_common_ioctl+0xa36/0x10a0 [ 407.825590][T26225] ? lo_release+0x120/0x120 01:44:35 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xf4, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0xf05a, 0x65}}}}, [@NL80211_ATTR_QOS_MAP={0xc, 0xc7, {[], "e2143db5275e63e6"}}, @NL80211_ATTR_QOS_MAP={0x2e, 0xc7, {[{0x9, 0x2}, {0x6, 0x2}, {0x80, 0x5}, {0x1, 0x6}, {0x4, 0x6}, {0x3, 0x2}, {0x81}, {0x1, 0x7}, {0x9, 0x2}, {0x2, 0x7}, {0x81, 0x2}, {0x1, 0x7}, {0x9}, {0x1}, {0x6d, 0x5}, {0x4, 0x7}, {0x6, 0x5}], "fe549db06fdded07"}}, @NL80211_ATTR_QOS_MAP={0x22, 0xc7, {[{0x4, 0x1}, {0x40, 0x6}, {0x6, 0x4}, {0x20, 0x1}, {0x0, 0x1}, {0x5}, {0x44, 0x1}, {0x3, 0x1}, {0x80}, {0x9, 0x5}, {0x8e, 0x7}], "d5718a6f87e52447"}}, @NL80211_ATTR_QOS_MAP={0x2e, 0xc7, {[{0x3, 0x7}, {0xff, 0x3}, {0x40, 0x1}, {0x2, 0x1}, {0x8, 0x6}, {0x6, 0x7}, {0xf2, 0x3}, {0xc0, 0x6}, {0x3, 0x4}, {0x7f}, {0x1f}, {0x0, 0x5}, {0x8, 0x7}, {0x7, 0x1}, {0x1, 0x5}, {0x4, 0x5}, {0x9, 0x1}], "8790d06dc79cde02"}}, @NL80211_ATTR_QOS_MAP={0x28, 0xc7, {[{}, {0x5, 0x6}, {0x0, 0x1}, {0x7f, 0x3}, {0x6, 0x1}, {0x3, 0x6}, {0x1, 0x3}, {0x2, 0x1}, {0xb4, 0x1}, {0x9f, 0x3}, {0x40, 0x2}, {0x0, 0x6}, {0x0, 0x6}, {0x9, 0x1}], "3c3f0cbfed855b38"}}, @NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{0x4, 0x5}, {0x5, 0x3}, {0x81}], "ffd009f52a58a516"}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x220600, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000280)={{0x5, 0x1}, {0x3, 0x1}, 0x3, 0x3, 0x3f}) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 407.830098][T26225] blkdev_ioctl+0x1d0/0x3c0 [ 407.834706][T26225] block_ioctl+0x6d/0x80 [ 407.839041][T26225] ? blkdev_iopoll+0x70/0x70 [ 407.843638][T26225] __se_sys_ioctl+0xcb/0x140 [ 407.848297][T26225] __x64_sys_ioctl+0x3f/0x50 [ 407.852969][T26225] do_syscall_64+0x39/0x80 [ 407.857440][T26225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 407.863339][T26225] RIP: 0033:0x466217 [ 407.867234][T26225] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 407.887279][T26225] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 407.895691][T26225] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 407.903709][T26225] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 407.911682][T26225] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 407.919736][T26225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 01:44:35 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, 0x0, 0x400000000003, 0x0) dup2(r0, r1) [ 407.927707][T26225] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 407.949857][T26225] loop1: detected capacity change from 0 to 4 [ 407.958567][T26221] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 407.973749][T26219] MINIX-fs: bad superblock or unable to read bitmaps [ 407.992170][T26231] loop2: detected capacity change from 0 to 8 [ 407.992874][T26225] MINIX-fs: bad superblock or unable to read bitmaps [ 408.016829][T26231] MINIX-fs: bad superblock or unable to read bitmaps 01:44:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='\'\x00', 0xfffffffffffffffe) r2 = request_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, r1) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', r2) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:35 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b", 0xe, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 408.053526][T26219] loop5: detected capacity change from 0 to 8 [ 408.079803][T26219] MINIX-fs: bad superblock or unable to read bitmaps 01:44:35 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:35 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:35 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) 01:44:35 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r2}}, 0x18) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:35 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) [ 408.182168][T26258] loop0: detected capacity change from 0 to 8 [ 408.195491][T26258] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:35 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b", 0xe, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 408.247837][T26265] loop2: detected capacity change from 0 to 8 [ 408.276332][T26268] loop5: detected capacity change from 0 to 8 01:44:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 408.299300][T26273] FAULT_INJECTION: forcing a failure. [ 408.299300][T26273] name failslab, interval 1, probability 0, space 0, times 0 01:44:36 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) [ 408.344806][T26273] CPU: 0 PID: 26273 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 408.353622][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.363676][T26273] Call Trace: [ 408.366955][T26273] dump_stack+0x137/0x19d [ 408.371292][T26273] should_fail+0x23c/0x250 [ 408.375709][T26273] ? __kernfs_new_node+0x73/0x360 [ 408.380864][T26273] __should_failslab+0x81/0x90 [ 408.385686][T26273] should_failslab+0x5/0x20 [ 408.390202][T26273] kmem_cache_alloc+0x46/0x320 [ 408.394974][T26273] __kernfs_new_node+0x73/0x360 [ 408.399843][T26273] ? kernfs_link_sibling+0x227/0x240 [ 408.405148][T26273] kernfs_new_node+0x5b/0xd0 [ 408.409755][T26273] __kernfs_create_file+0x45/0x1a0 [ 408.414876][T26273] sysfs_add_file_mode_ns+0x1c1/0x250 [ 408.420263][T26273] internal_create_group+0x2e4/0x850 [ 408.425621][T26273] sysfs_create_group+0x1b/0x20 [ 408.430493][T26273] loop_configure+0xa21/0xcb0 [ 408.435240][T26273] lo_ioctl+0x555/0x11f0 [ 408.439509][T26273] ? ___cache_free+0x3c/0x2f0 [ 408.444204][T26273] ? blkdev_common_ioctl+0xa36/0x10a0 [ 408.449619][T26273] ? lo_release+0x120/0x120 [ 408.454142][T26273] blkdev_ioctl+0x1d0/0x3c0 [ 408.458680][T26273] block_ioctl+0x6d/0x80 [ 408.462957][T26273] ? blkdev_iopoll+0x70/0x70 [ 408.467560][T26273] __se_sys_ioctl+0xcb/0x140 [ 408.472231][T26273] __x64_sys_ioctl+0x3f/0x50 [ 408.476870][T26273] do_syscall_64+0x39/0x80 [ 408.481323][T26273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 408.487252][T26273] RIP: 0033:0x466217 [ 408.491147][T26273] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 408.510827][T26273] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.519250][T26273] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 408.527223][T26273] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 408.535194][T26273] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 408.543179][T26273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 408.551183][T26273] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 408.567890][T26273] loop1: detected capacity change from 0 to 4 [ 408.598245][T26268] MINIX-fs: bad superblock or unable to read bitmaps [ 408.600168][T26265] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 408.616286][T26281] loop0: detected capacity change from 0 to 8 [ 408.626858][T26273] MINIX-fs: bad superblock or unable to read bitmaps 01:44:36 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 408.644814][T26281] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:36 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b", 0xe, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 408.682262][T26268] loop5: detected capacity change from 0 to 8 [ 408.692783][T26268] MINIX-fs: bad superblock or unable to read bitmaps 01:44:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:36 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, r1) 01:44:36 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:36 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x5c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 408.789028][T26298] loop2: detected capacity change from 0 to 8 [ 408.795862][T26305] FAULT_INJECTION: forcing a failure. [ 408.795862][T26305] name failslab, interval 1, probability 0, space 0, times 0 [ 408.826250][T26298] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 408.860497][T26305] CPU: 0 PID: 26305 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 408.870911][T26305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.880968][T26305] Call Trace: [ 408.884249][T26305] dump_stack+0x137/0x19d [ 408.888592][T26305] should_fail+0x23c/0x250 [ 408.893016][T26305] ? __kernfs_new_node+0x73/0x360 [ 408.898044][T26305] __should_failslab+0x81/0x90 [ 408.902812][T26305] should_failslab+0x5/0x20 [ 408.907328][T26305] kmem_cache_alloc+0x46/0x320 [ 408.912092][T26305] __kernfs_new_node+0x73/0x360 [ 408.916965][T26305] ? kernfs_link_sibling+0x227/0x240 [ 408.922268][T26305] kernfs_new_node+0x5b/0xd0 [ 408.926875][T26305] __kernfs_create_file+0x45/0x1a0 [ 408.931991][T26305] sysfs_add_file_mode_ns+0x1c1/0x250 [ 408.937368][T26305] internal_create_group+0x2e4/0x850 [ 408.942801][T26305] sysfs_create_group+0x1b/0x20 [ 408.947662][T26305] loop_configure+0xa21/0xcb0 [ 408.952401][T26305] lo_ioctl+0x555/0x11f0 [ 408.956658][T26305] ? ___cache_free+0x3c/0x2f0 [ 408.961404][T26305] ? blkdev_common_ioctl+0xa36/0x10a0 [ 408.966863][T26305] ? lo_release+0x120/0x120 [ 408.971373][T26305] blkdev_ioctl+0x1d0/0x3c0 [ 408.975890][T26305] block_ioctl+0x6d/0x80 [ 408.980252][T26305] ? blkdev_iopoll+0x70/0x70 [ 408.984855][T26305] __se_sys_ioctl+0xcb/0x140 [ 408.989461][T26305] __x64_sys_ioctl+0x3f/0x50 [ 408.994072][T26305] do_syscall_64+0x39/0x80 [ 408.998492][T26305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 409.004489][T26305] RIP: 0033:0x466217 [ 409.008411][T26305] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 409.028074][T26305] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 409.036498][T26305] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 409.044479][T26305] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 409.052462][T26305] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 01:44:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='.dead\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) [ 409.060452][T26305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 409.068437][T26305] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 409.095881][T26305] loop1: detected capacity change from 0 to 4 [ 409.102220][T26312] loop0: detected capacity change from 0 to 8 01:44:36 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)='@\x00', 0x2, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 409.124668][T26305] MINIX-fs: bad superblock or unable to read bitmaps [ 409.136555][T26312] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:36 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xab}, {0xa, 0x4e24, 0x7fff, @private1={0xfc, 0x1, [], 0x1}, 0x9}, r1, 0x3}}, 0x48) [ 409.207218][T26322] loop5: detected capacity change from 0 to 8 [ 409.250227][T26322] MINIX-fs: bad superblock or unable to read bitmaps [ 409.270171][T26332] FAULT_INJECTION: forcing a failure. [ 409.270171][T26332] name failslab, interval 1, probability 0, space 0, times 0 [ 409.283337][T26328] loop2: detected capacity change from 0 to 8 01:44:36 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 409.308428][T26328] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 409.325990][T26332] CPU: 1 PID: 26332 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 409.334879][T26332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.344947][T26332] Call Trace: [ 409.348326][T26332] dump_stack+0x137/0x19d [ 409.352691][T26332] should_fail+0x23c/0x250 [ 409.357117][T26332] ? __kernfs_new_node+0x73/0x360 [ 409.362347][T26332] __should_failslab+0x81/0x90 [ 409.367204][T26332] should_failslab+0x5/0x20 [ 409.371727][T26332] kmem_cache_alloc+0x46/0x320 [ 409.376507][T26332] __kernfs_new_node+0x73/0x360 [ 409.381467][T26332] ? kernfs_link_sibling+0x227/0x240 [ 409.386779][T26332] kernfs_new_node+0x5b/0xd0 [ 409.391460][T26332] __kernfs_create_file+0x45/0x1a0 [ 409.396591][T26332] sysfs_add_file_mode_ns+0x1c1/0x250 [ 409.401985][T26332] internal_create_group+0x2e4/0x850 [ 409.407719][T26332] sysfs_create_group+0x1b/0x20 [ 409.412756][T26332] loop_configure+0xa21/0xcb0 [ 409.417971][T26332] lo_ioctl+0x555/0x11f0 [ 409.422553][T26332] ? ___cache_free+0x3c/0x2f0 [ 409.427586][T26332] ? blkdev_common_ioctl+0xa36/0x10a0 [ 409.433974][T26332] ? lo_release+0x120/0x120 [ 409.438776][T26332] blkdev_ioctl+0x1d0/0x3c0 [ 409.443385][T26332] block_ioctl+0x6d/0x80 [ 409.447671][T26332] ? blkdev_iopoll+0x70/0x70 [ 409.452464][T26332] __se_sys_ioctl+0xcb/0x140 [ 409.457394][T26332] __x64_sys_ioctl+0x3f/0x50 [ 409.462027][T26332] do_syscall_64+0x39/0x80 [ 409.466809][T26332] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 409.472944][T26332] RIP: 0033:0x466217 [ 409.477227][T26332] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 409.497873][T26332] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:44:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x8}}, 0x10) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 409.507022][T26332] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 409.515263][T26332] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 409.523475][T26332] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 409.531478][T26332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 409.539782][T26332] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 409.551270][T26341] loop0: detected capacity change from 0 to 8 01:44:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000000)={0xeeb000000000, 0x40000000000006}) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 409.567619][T26332] loop1: detected capacity change from 0 to 4 [ 409.581502][T26341] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 409.588856][T26332] MINIX-fs: bad superblock or unable to read bitmaps [ 409.604684][T26322] loop5: detected capacity change from 0 to 8 01:44:37 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 409.617009][T26322] MINIX-fs: bad superblock or unable to read bitmaps 01:44:37 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, r1) 01:44:37 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:37 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:37 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 409.736151][T26360] loop2: detected capacity change from 0 to 8 [ 409.745629][T26360] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 409.773234][T26368] FAULT_INJECTION: forcing a failure. [ 409.773234][T26368] name failslab, interval 1, probability 0, space 0, times 0 01:44:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2d5, 0x501080) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x106}}, 0x20) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000600)="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", 0x1000, r1) [ 409.786936][T26368] CPU: 1 PID: 26368 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 409.796655][T26368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.807221][T26368] Call Trace: [ 409.810525][T26368] dump_stack+0x137/0x19d [ 409.815148][T26368] should_fail+0x23c/0x250 [ 409.819676][T26368] ? __kernfs_new_node+0x73/0x360 [ 409.825239][T26368] __should_failslab+0x81/0x90 [ 409.830700][T26368] should_failslab+0x5/0x20 [ 409.835235][T26368] kmem_cache_alloc+0x46/0x320 [ 409.840162][T26368] __kernfs_new_node+0x73/0x360 [ 409.845217][T26368] ? kernfs_link_sibling+0x227/0x240 [ 409.850596][T26368] kernfs_new_node+0x5b/0xd0 [ 409.854512][T26373] loop0: detected capacity change from 0 to 8 [ 409.855404][T26368] __kernfs_create_file+0x45/0x1a0 [ 409.866708][T26368] sysfs_add_file_mode_ns+0x1c1/0x250 [ 409.872371][T26368] internal_create_group+0x2e4/0x850 [ 409.877904][T26368] sysfs_create_group+0x1b/0x20 [ 409.882888][T26368] loop_configure+0xa21/0xcb0 [ 409.887676][T26368] lo_ioctl+0x555/0x11f0 [ 409.892303][T26368] ? ___cache_free+0x3c/0x2f0 [ 409.897419][T26368] ? blkdev_common_ioctl+0xa36/0x10a0 [ 409.902822][T26368] ? lo_release+0x120/0x120 [ 409.907680][T26368] blkdev_ioctl+0x1d0/0x3c0 [ 409.909496][T26373] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 409.912206][T26368] block_ioctl+0x6d/0x80 [ 409.912235][T26368] ? blkdev_iopoll+0x70/0x70 [ 409.929841][T26368] __se_sys_ioctl+0xcb/0x140 [ 409.934623][T26368] __x64_sys_ioctl+0x3f/0x50 [ 409.939341][T26368] do_syscall_64+0x39/0x80 [ 409.943789][T26368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 409.950243][T26368] RIP: 0033:0x466217 [ 409.954270][T26368] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 409.974887][T26368] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:44:37 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 409.983586][T26368] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 409.991919][T26368] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 410.000545][T26368] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 410.008716][T26368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 410.016883][T26368] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 410.027722][T26371] loop5: detected capacity change from 0 to 8 01:44:37 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 410.067988][T26368] loop1: detected capacity change from 0 to 4 [ 410.077367][T26368] MINIX-fs: bad superblock or unable to read bitmaps [ 410.085627][T26371] MINIX-fs: bad superblock or unable to read bitmaps [ 410.102786][T26387] loop2: detected capacity change from 0 to 8 01:44:37 executing program 3: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x19001) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="69705f767469300007e5796fe5d1a021697bf55d0e693001993562d3c6c9c38a94a566d0e63ebc92ddad6deb10da87e9859a882f307cd026bf2ba08747f39e9e01de19", @ANYRES32=0x0, @ANYBLOB="0080800000000009000000054dfd00740065000003299078e0000001ac1414aa0100440c648000000002800000008307afac1e0001008629000000030202000ddc81f2af0300000000004f0305ad0d3a010fccf0384917a0ea5464d691c82a862100000002000972c1ac3877e11200020610a263a6793ee834531688907f1a87"]}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_getroute={0x48, 0x1a, 0x2, 0x70bd26, 0x25dfdbff, {0xa, 0x0, 0x20, 0x1, 0x0, 0xe7df4d1ff58df51a, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x7}, @RTA_IIF={0x8, 0x3, r1}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_GATEWAY={0x14, 0x5, @ipv4={[], [], @loopback}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4080) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:37 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 410.111000][T26387] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:37 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 410.165403][T26371] loop5: detected capacity change from 0 to 8 [ 410.182519][T26371] MINIX-fs: bad superblock or unable to read bitmaps [ 410.219918][T26400] loop1: detected capacity change from 0 to 4 [ 410.230914][T26400] FAULT_INJECTION: forcing a failure. [ 410.230914][T26400] name failslab, interval 1, probability 0, space 0, times 0 [ 410.240306][T26403] loop0: detected capacity change from 0 to 8 01:44:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 410.264563][T26403] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 410.277621][T26408] loop2: detected capacity change from 0 to 8 [ 410.312826][T26400] CPU: 1 PID: 26400 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 410.322329][T26400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.333356][T26400] Call Trace: [ 410.336978][T26400] dump_stack+0x137/0x19d [ 410.341402][T26400] should_fail+0x23c/0x250 [ 410.346202][T26400] __should_failslab+0x81/0x90 [ 410.351549][T26400] ? kobject_uevent_env+0x1a7/0xc40 [ 410.358786][T26400] should_failslab+0x5/0x20 [ 410.363482][T26400] kmem_cache_alloc_trace+0x49/0x340 [ 410.368857][T26400] ? vprintk_func+0x11b/0x120 [ 410.374280][T26400] ? dev_uevent_filter+0x70/0x70 [ 410.380012][T26400] kobject_uevent_env+0x1a7/0xc40 [ 410.385476][T26400] kobject_uevent+0x18/0x20 [ 410.390657][T26400] loop_configure+0xb3c/0xcb0 [ 410.395369][T26400] lo_ioctl+0x555/0x11f0 [ 410.399683][T26400] ? ___cache_free+0x3c/0x2f0 [ 410.404577][T26400] ? blkdev_common_ioctl+0xa36/0x10a0 01:44:38 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 410.410128][T26400] ? lo_release+0x120/0x120 [ 410.415557][T26400] blkdev_ioctl+0x1d0/0x3c0 [ 410.420486][T26400] block_ioctl+0x6d/0x80 [ 410.425114][T26400] ? blkdev_iopoll+0x70/0x70 [ 410.430155][T26400] __se_sys_ioctl+0xcb/0x140 [ 410.435081][T26400] __x64_sys_ioctl+0x3f/0x50 [ 410.440258][T26400] do_syscall_64+0x39/0x80 [ 410.445308][T26400] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 410.451804][T26400] RIP: 0033:0x466217 [ 410.456211][T26400] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 410.478215][T26400] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 410.488006][T26400] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 410.496935][T26400] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 410.505658][T26400] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 410.514658][T26400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 410.524040][T26400] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 410.542224][T26408] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:38 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r2, &(0x7f0000000100), 0x400000000003, 0x0) dup2(0xffffffffffffffff, r1) 01:44:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='cubic\x00', 0x6) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x1, 0x4000) connect$bt_rfcomm(r5, &(0x7f0000000300)={0x1f, @any, 0x9}, 0xa) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x2}}, 0x18) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:38 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 410.558914][T26400] MINIX-fs: bad superblock or unable to read bitmaps [ 410.579318][T26418] loop5: detected capacity change from 0 to 8 [ 410.591573][T26418] MINIX-fs: bad superblock or unable to read bitmaps 01:44:38 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:38 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 410.686484][T26418] loop5: detected capacity change from 0 to 8 [ 410.714656][T26418] MINIX-fs: bad superblock or unable to read bitmaps [ 410.738525][T26434] loop1: detected capacity change from 0 to 4 [ 410.745453][T26434] FAULT_INJECTION: forcing a failure. [ 410.745453][T26434] name failslab, interval 1, probability 0, space 0, times 0 [ 410.759755][T26436] loop0: detected capacity change from 0 to 8 [ 410.782291][T26441] loop2: detected capacity change from 0 to 8 [ 410.794431][T26434] CPU: 0 PID: 26434 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 410.803791][T26441] MINIX-fs: bad superblock or unable to read bitmaps [ 410.804599][T26434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.804614][T26434] Call Trace: [ 410.825660][T26434] dump_stack+0x137/0x19d [ 410.830564][T26434] should_fail+0x23c/0x250 [ 410.835008][T26434] __should_failslab+0x81/0x90 [ 410.840549][T26434] ? kzalloc+0x1d/0x30 [ 410.844928][T26434] should_failslab+0x5/0x20 [ 410.849804][T26434] __kmalloc+0x66/0x380 [ 410.854726][T26434] kzalloc+0x1d/0x30 [ 410.858948][T26434] kobject_get_path+0x7c/0x110 [ 410.863894][T26434] kobject_uevent_env+0x1be/0xc40 [ 410.869099][T26434] kobject_uevent+0x18/0x20 [ 410.873904][T26434] loop_configure+0xb3c/0xcb0 [ 410.878918][T26434] lo_ioctl+0x555/0x11f0 [ 410.884022][T26434] ? ___cache_free+0x3c/0x2f0 [ 410.889062][T26434] ? blkdev_common_ioctl+0xa36/0x10a0 [ 410.895340][T26434] ? lo_release+0x120/0x120 [ 410.899981][T26434] blkdev_ioctl+0x1d0/0x3c0 [ 410.905147][T26434] block_ioctl+0x6d/0x80 [ 410.909767][T26434] ? blkdev_iopoll+0x70/0x70 [ 410.914680][T26434] __se_sys_ioctl+0xcb/0x140 [ 410.919802][T26434] __x64_sys_ioctl+0x3f/0x50 [ 410.924973][T26434] do_syscall_64+0x39/0x80 [ 410.929437][T26434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 410.935824][T26434] RIP: 0033:0x466217 [ 410.942783][T26434] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 410.964534][T26434] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 410.973448][T26434] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 410.982329][T26434] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 01:44:38 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 410.990659][T26434] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 410.999233][T26434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 411.007782][T26434] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 411.033205][T26436] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x8, r4, 0x0, 0x0, 0x1}}, 0x20) r5 = request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r6, 0x0, r8, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r6, r7) r9 = syz_io_uring_complete(0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r9, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x90, 0x0, 0x8, 0x70bd26, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x200}, {0x8, 0x13, 0xffff}, {0x5, 0x14, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x46fe}, {0x6, 0x11, 0x3}, {0x8, 0x13, 0x2}, {0x5, 0x14, 0x1}}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0xf9a}, {0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0x24}, 0x7ff}, 0xffffffffffffffff, 0xad}}, 0x48) keyctl$assume_authority(0x10, r5) 01:44:38 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:38 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 411.142539][T26457] loop5: detected capacity change from 0 to 8 01:44:38 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 411.192586][T26457] MINIX-fs: bad superblock or unable to read bitmaps [ 411.212777][T26434] MINIX-fs: bad superblock or unable to read bitmaps 01:44:38 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 411.278762][T26463] loop2: detected capacity change from 0 to 8 [ 411.309734][T26463] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:39 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 411.375124][T26472] loop0: detected capacity change from 0 to 8 [ 411.387215][T26472] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 411.438789][T26473] loop1: detected capacity change from 0 to 4 [ 411.445115][T26473] FAULT_INJECTION: forcing a failure. [ 411.445115][T26473] name failslab, interval 1, probability 0, space 0, times 0 [ 411.497970][T26473] CPU: 0 PID: 26473 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 411.507318][T26473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.517981][T26473] Call Trace: [ 411.521588][T26473] dump_stack+0x137/0x19d [ 411.526291][T26473] should_fail+0x23c/0x250 [ 411.531043][T26473] __should_failslab+0x81/0x90 [ 411.536324][T26473] should_failslab+0x5/0x20 [ 411.541296][T26473] kmem_cache_alloc_node+0x56/0x310 [ 411.549395][T26473] ? __alloc_skb+0xed/0x420 [ 411.554418][T26473] __alloc_skb+0xed/0x420 [ 411.559380][T26473] alloc_uevent_skb+0x5b/0x120 [ 411.564820][T26473] kobject_uevent_env+0x863/0xc40 [ 411.570049][T26473] kobject_uevent+0x18/0x20 [ 411.575804][T26473] loop_configure+0xb3c/0xcb0 [ 411.580692][T26473] lo_ioctl+0x555/0x11f0 [ 411.585092][T26473] ? ___cache_free+0x3c/0x2f0 [ 411.590536][T26473] ? blkdev_common_ioctl+0xa36/0x10a0 [ 411.596502][T26473] ? lo_release+0x120/0x120 [ 411.601296][T26473] blkdev_ioctl+0x1d0/0x3c0 [ 411.606881][T26473] block_ioctl+0x6d/0x80 [ 411.611373][T26473] ? blkdev_iopoll+0x70/0x70 [ 411.616187][T26473] __se_sys_ioctl+0xcb/0x140 [ 411.621074][T26473] __x64_sys_ioctl+0x3f/0x50 [ 411.626238][T26473] do_syscall_64+0x39/0x80 [ 411.631281][T26473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 411.637497][T26473] RIP: 0033:0x466217 [ 411.641546][T26473] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 411.665233][T26473] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 411.674381][T26473] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 411.686246][T26473] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 01:44:39 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r1, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, 0xffffffffffffffff) 01:44:39 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xec6, @mcast1}, {0xa, 0x4e22, 0x4, @mcast1, 0x6}, r2, 0x8000}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8e, @ipv4={[], [], @empty}}, r2}}, 0x30) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x106, 0x8}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 411.695078][T26473] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 411.703639][T26473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 411.712289][T26473] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 411.721062][T26481] loop5: detected capacity change from 0 to 8 [ 411.761759][T26481] MINIX-fs: bad superblock or unable to read bitmaps [ 411.770813][T26473] MINIX-fs: bad superblock or unable to read bitmaps [ 411.797409][T26484] loop0: detected capacity change from 0 to 8 01:44:39 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:39 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:39 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 411.868524][T26484] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 411.887693][T26497] loop2: detected capacity change from 0 to 8 [ 411.896855][T26497] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:39 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e97", 0xd, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:39 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, r0) [ 411.983121][T26507] loop5: detected capacity change from 0 to 8 [ 412.008686][T26507] MINIX-fs: bad superblock or unable to read bitmaps [ 412.021660][T26505] loop1: detected capacity change from 0 to 4 [ 412.028125][T26505] FAULT_INJECTION: forcing a failure. [ 412.028125][T26505] name failslab, interval 1, probability 0, space 0, times 0 [ 412.042008][T26514] loop0: detected capacity change from 0 to 8 [ 412.072381][T26505] CPU: 1 PID: 26505 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 412.082297][T26505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.093502][T26505] Call Trace: [ 412.096803][T26505] dump_stack+0x137/0x19d [ 412.101260][T26505] should_fail+0x23c/0x250 [ 412.106032][T26505] __should_failslab+0x81/0x90 [ 412.108470][T26519] loop2: detected capacity change from 0 to 8 [ 412.111628][T26505] should_failslab+0x5/0x20 [ 412.122841][T26505] kmem_cache_alloc_node_trace+0x5b/0x310 [ 412.134371][T26505] ? __kmalloc_node_track_caller+0x30/0x40 [ 412.140501][T26505] __kmalloc_node_track_caller+0x30/0x40 [ 412.147141][T26505] ? alloc_uevent_skb+0x5b/0x120 [ 412.152428][T26505] __alloc_skb+0x187/0x420 [ 412.157069][T26505] alloc_uevent_skb+0x5b/0x120 [ 412.162498][T26505] kobject_uevent_env+0x863/0xc40 [ 412.168719][T26505] kobject_uevent+0x18/0x20 [ 412.173517][T26505] loop_configure+0xb3c/0xcb0 [ 412.178683][T26505] lo_ioctl+0x555/0x11f0 [ 412.183043][T26505] ? ___cache_free+0x3c/0x2f0 [ 412.187768][T26505] ? blkdev_common_ioctl+0xa36/0x10a0 [ 412.193192][T26505] ? lo_release+0x120/0x120 [ 412.198196][T26505] blkdev_ioctl+0x1d0/0x3c0 [ 412.202782][T26505] block_ioctl+0x6d/0x80 [ 412.207226][T26505] ? blkdev_iopoll+0x70/0x70 [ 412.212188][T26505] __se_sys_ioctl+0xcb/0x140 [ 412.217097][T26505] __x64_sys_ioctl+0x3f/0x50 [ 412.222182][T26505] do_syscall_64+0x39/0x80 [ 412.227082][T26505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 412.233425][T26505] RIP: 0033:0x466217 [ 412.239044][T26505] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 412.261836][T26505] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 412.272179][T26505] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 412.280851][T26505] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 412.289336][T26505] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 412.297908][T26505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 412.306872][T26505] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 412.327358][T26505] MINIX-fs: bad superblock or unable to read bitmaps [ 412.332718][T26514] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 412.355686][T26519] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 412.370402][T26507] loop5: detected capacity change from 0 to 8 01:44:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:40 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:40 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xc8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:40 executing program 3: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 412.592669][T26539] loop0: detected capacity change from 0 to 8 [ 412.620338][T26539] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 01:44:40 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r1, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, 0xffffffffffffffff) 01:44:40 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:40 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 412.652710][T26543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 412.664741][T26543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 412.675541][T26543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 01:44:40 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 412.736104][T26546] loop5: detected capacity change from 0 to 8 [ 412.764807][T26546] MINIX-fs: bad superblock or unable to read bitmaps [ 412.775749][T26543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 412.790115][T26556] loop2: detected capacity change from 0 to 8 [ 412.807121][T26556] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 412.809055][T26543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 412.827693][T26561] loop0: detected capacity change from 0 to 8 [ 412.835608][T26559] loop1: detected capacity change from 0 to 4 [ 412.842460][T26559] FAULT_INJECTION: forcing a failure. [ 412.842460][T26559] name failslab, interval 1, probability 0, space 0, times 0 [ 412.856604][T26543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 412.867137][T26559] CPU: 1 PID: 26559 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 412.876308][T26559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.886568][T26559] Call Trace: [ 412.889874][T26559] dump_stack+0x137/0x19d [ 412.894493][T26559] should_fail+0x23c/0x250 [ 412.898989][T26559] ? skb_clone+0x12c/0x1f0 [ 412.903994][T26559] __should_failslab+0x81/0x90 [ 412.908795][T26559] should_failslab+0x5/0x20 [ 412.913402][T26559] kmem_cache_alloc+0x46/0x320 [ 412.918797][T26559] skb_clone+0x12c/0x1f0 [ 412.923085][T26559] netlink_broadcast_filtered+0x4fd/0xb80 [ 412.929287][T26559] ? skb_put+0xb9/0xf0 [ 412.933533][T26559] netlink_broadcast+0x35/0x50 [ 412.939522][T26559] kobject_uevent_env+0x8c9/0xc40 [ 412.944739][T26559] kobject_uevent+0x18/0x20 [ 412.949426][T26559] loop_configure+0xb3c/0xcb0 [ 412.954224][T26559] lo_ioctl+0x555/0x11f0 [ 412.958499][T26559] ? ___cache_free+0x3c/0x2f0 [ 412.963656][T26559] ? blkdev_common_ioctl+0xa36/0x10a0 [ 412.969376][T26559] ? lo_release+0x120/0x120 [ 412.974268][T26559] blkdev_ioctl+0x1d0/0x3c0 [ 412.978893][T26559] block_ioctl+0x6d/0x80 [ 412.983211][T26559] ? blkdev_iopoll+0x70/0x70 [ 412.987897][T26559] __se_sys_ioctl+0xcb/0x140 [ 412.992617][T26559] __x64_sys_ioctl+0x3f/0x50 [ 412.997802][T26559] do_syscall_64+0x39/0x80 [ 413.002580][T26559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 413.008699][T26559] RIP: 0033:0x466217 [ 413.012702][T26559] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 413.022967][T26543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 413.033720][T26559] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 413.033747][T26559] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 413.033760][T26559] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 413.033773][T26559] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 413.033786][T26559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 413.033799][T26559] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 413.086861][T26543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 413.107345][T26543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 413.120099][T26543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:44:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000280)=""/200, 0xc8) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @empty}}}, 0x90) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r1}}, 0x18) [ 413.168308][T26561] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 413.191338][T26559] MINIX-fs: bad superblock or unable to read bitmaps [ 413.205773][T26546] loop5: detected capacity change from 0 to 8 01:44:40 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:40 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) 01:44:40 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000040)=""/67, 0x43, &(0x7f00000000c0)=""/161, 0xd6ad5a2a573e7d27, 0x2}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x40, 0x0) fsmount(r0, 0x0, 0x7e) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000380)='\x00\xb3\xeb\x9e\x7f\xe3\x86E\xbb\xaeUr\xdd2U\xc0\x1bB\xb0:`\xfd?\xf3\xf4\b\x00\x00\x00\x00\x00\x00\x00qL\xc2\xf5\x10\x9fi\xa5\xd7\xe6\xd4i\x9f\xa7TgB\xe0\x89\xf2o\x8b\xd7\xea\x85[\x0e\xb2\xd6\t\xd0\xcc\xabR\x88V\xbd\vs\x9e\xfcI0\x1bG\xc3t%<\xe8p1\xd6\xf5\x13\xa8\xfe\x04\xac\x8fe(\t\x1f\xbc\x10\xf4C\xc6\xba\xe9->\x8e\xc8\r\xfd\xc6e\xe1\xed\x7f\x83\xc9\x0e\xbd\xdf\xbb,(Y\ag\xc8U\x90\xd5\x03f\xcf\xaf\xe4\xd59\x9f\xba\x02\x99q\xa8\xec\xc5\xf6\xc99\x96\xb8t\xe9\x18dU\xb9)\x16qi\xbc7\xfa\xcc\'\xd7\xad6@g\xe9\xbc\xe4\x04\x96?g\x05\x11\x17/\x13\xf6U\x1e\x9aH0\x8e\xbe:\xc4\x82\x84\xfc\x01l\xe3\x98z\xdaJx\xcb\x88\xd6\x94', 0x2) splice(r2, 0x0, r4, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r2, r3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r5, 0x0, r7, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r5, r6) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x2100807, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@cachetag={'cachetag', 0x3d, '{!'}}], [{@smackfsdef={'smackfsdef'}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}]}}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, 0x0, 0x0) [ 413.243601][T26546] MINIX-fs: bad superblock or unable to read bitmaps 01:44:40 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:40 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 413.335518][T26584] loop0: detected capacity change from 0 to 8 [ 413.346252][T26581] loop2: detected capacity change from 0 to 8 [ 413.356921][T26581] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:41 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) [ 413.393068][T26590] loop5: detected capacity change from 0 to 8 [ 413.432646][T26590] MINIX-fs: bad superblock or unable to read bitmaps 01:44:41 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b0810", 0x10, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 413.446869][T26594] loop1: detected capacity change from 0 to 4 [ 413.453728][T26594] FAULT_INJECTION: forcing a failure. [ 413.453728][T26594] name failslab, interval 1, probability 0, space 0, times 0 [ 413.466850][T26594] CPU: 0 PID: 26594 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 413.475888][T26594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.486111][T26594] Call Trace: [ 413.489412][T26594] dump_stack+0x137/0x19d [ 413.494005][T26594] should_fail+0x23c/0x250 [ 413.498450][T26594] __should_failslab+0x81/0x90 [ 413.503237][T26594] ? call_usermodehelper_setup+0x81/0x160 [ 413.508999][T26594] should_failslab+0x5/0x20 [ 413.514164][T26594] kmem_cache_alloc_trace+0x49/0x340 [ 413.519714][T26594] ? add_uevent_var+0x16e/0x1c0 [ 413.524932][T26594] ? __kfree_skb+0xfe/0x150 [ 413.529923][T26594] call_usermodehelper_setup+0x81/0x160 [ 413.535495][T26594] ? add_uevent_var+0x1c0/0x1c0 [ 413.540426][T26594] kobject_uevent_env+0xb31/0xc40 [ 413.545706][T26594] kobject_uevent+0x18/0x20 [ 413.550500][T26594] loop_configure+0xb3c/0xcb0 [ 413.555483][T26594] lo_ioctl+0x555/0x11f0 [ 413.560037][T26594] ? ___cache_free+0x3c/0x2f0 [ 413.564853][T26594] ? blkdev_common_ioctl+0xa36/0x10a0 [ 413.570332][T26594] ? lo_release+0x120/0x120 [ 413.575139][T26594] blkdev_ioctl+0x1d0/0x3c0 [ 413.579827][T26594] block_ioctl+0x6d/0x80 [ 413.584212][T26594] ? blkdev_iopoll+0x70/0x70 [ 413.589168][T26594] __se_sys_ioctl+0xcb/0x140 [ 413.593931][T26594] __x64_sys_ioctl+0x3f/0x50 [ 413.599233][T26594] do_syscall_64+0x39/0x80 [ 413.603919][T26594] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 413.610053][T26594] RIP: 0033:0x466217 [ 413.614162][T26594] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 413.634610][T26594] RSP: 002b:00007f50ffcfdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:44:41 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r0, 0x0, r1, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r0, 0xffffffffffffffff) 01:44:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 413.643497][T26594] RAX: ffffffffffffffda RBX: 00000000004afb60 RCX: 0000000000466217 [ 413.652283][T26594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 413.660698][T26594] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 413.668924][T26594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 413.677104][T26594] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 413.714936][T26590] loop5: detected capacity change from 0 to 8 [ 413.734662][T26590] MINIX-fs: bad superblock or unable to read bitmaps [ 413.761763][T26608] loop2: detected capacity change from 0 to 8 [ 413.773353][T26608] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 413.787279][T26594] MINIX-fs: bad superblock or unable to read bitmaps 01:44:41 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000002c0)='\xc3\x99\xac:`\x93\x7f\xb9@\x99\x9d\xb2\xc7\xbc\xaf\xd0\xa2y\xdd\x0f\xde\x12{\xd5\x0f$\xa6[\x9dt\xf3\x8e\x8c\x0f-\xfbO\xaa\x16\x1d$\xb0i\x12R\x93\xa9\xd4\x90\x05Y\x10\xd8\x86\xbbJ\xce\x01\xd5\x90\x06?\xacb\xc8\xee\x0f\x80;`y\xbc', 0x2) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) r4 = dup2(r1, r2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r5, 0x0, r7, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r5, r6) r8 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x2, 0x4}}, 0x20) splice(0xffffffffffffffff, 0x0, r8, &(0x7f0000000100), 0x400000000003, 0x0) keyctl$unlink(0x9, r0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r9, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x2}, 0x0, 0x0, 0x4, 0x0, 0x15, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40, 0x0, 0x4]}) r10 = fspick(r4, &(0x7f0000000000)='./file0\x00', 0x1) sendfile(0xffffffffffffffff, r10, &(0x7f0000000040)=0x4000000000003fe, 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:41 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:41 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 413.843619][T26613] loop0: detected capacity change from 0 to 8 01:44:41 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) 01:44:41 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 414.017738][T26631] loop5: detected capacity change from 0 to 8 [ 414.025094][T26630] loop2: detected capacity change from 0 to 8 [ 414.040844][T26631] MINIX-fs: bad superblock or unable to read bitmaps [ 414.063191][T26636] loop1: detected capacity change from 0 to 4 [ 414.063456][T26630] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 414.070853][T26637] loop0: detected capacity change from 0 to 8 [ 414.093755][T26636] FAULT_INJECTION: forcing a failure. [ 414.093755][T26636] name failslab, interval 1, probability 0, space 0, times 0 [ 414.137421][T26636] CPU: 1 PID: 26636 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 414.146291][T26636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.157287][T26636] Call Trace: [ 414.160725][T26636] dump_stack+0x137/0x19d [ 414.165158][T26636] should_fail+0x23c/0x250 [ 414.169895][T26636] ? getname_flags+0x84/0x3d0 [ 414.174653][T26636] __should_failslab+0x81/0x90 [ 414.179672][T26636] should_failslab+0x5/0x20 [ 414.184300][T26636] kmem_cache_alloc+0x46/0x320 [ 414.189443][T26636] getname_flags+0x84/0x3d0 [ 414.193961][T26636] do_mkdirat+0x3a/0x230 [ 414.198316][T26636] __x64_sys_mkdir+0x32/0x40 [ 414.203036][T26636] do_syscall_64+0x39/0x80 [ 414.207720][T26636] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 414.213647][T26636] RIP: 0033:0x465567 [ 414.217745][T26636] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 414.239263][T26636] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 414.248420][T26636] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 414.256955][T26636] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 414.265464][T26636] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 414.273618][T26636] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 01:44:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) ioctl$FITHAW(r1, 0xc0045878) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 414.281789][T26636] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:41 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:42 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 414.432385][T26654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.443742][T26654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.456228][T26654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.462839][T26653] loop2: detected capacity change from 0 to 8 01:44:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='[@\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 414.478195][T26653] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 414.488314][T26654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.498201][T26654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.509088][T26654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.510131][T26631] loop5: detected capacity change from 0 to 8 [ 414.518941][T26654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.518959][T26654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.519036][T26654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.560087][T26631] MINIX-fs: bad superblock or unable to read bitmaps 01:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 414.588170][T26654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:44:42 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:42 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="dc4090010fea30529370091786c9beaeb9e942c2045ff58ae640a1a5df5c4e9ee20ad85e9c696de9ea838e6c4cd290509bb8f7790902c4e589f5ecfde32b8c1190c0a3fa261954ef4162c944bd0679ce497d12fc37465cb5963035f7e8d8165c1404e611cc907fd04ceb04344e9fbb49c34864a8899a9aca3b29554c516a594055278881903720490f799f35400c9052392c", 0x92, 0xfffffffffffffffa) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r3) request_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='keyring\x00', r3) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r2) 01:44:42 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:42 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f", 0x11, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:42 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 414.799983][T26680] loop5: detected capacity change from 0 to 8 [ 414.808619][T26682] loop2: detected capacity change from 0 to 8 [ 414.897351][T26680] MINIX-fs: bad superblock or unable to read bitmaps [ 414.937851][T26682] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 414.953876][T26688] loop1: detected capacity change from 0 to 4 01:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:42 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@private0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000700)=@ipv4_newaddr={0x64, 0x14, 0x300, 0x70bd29, 0x25dfdbff, {0x2, 0x38, 0x20, 0xfd, r0}, [@IFA_ADDRESS={0x8, 0x1, @multicast2}, @IFA_LABEL={0x14, 0x3, 'team0\x00'}, @IFA_FLAGS={0x8, 0x8, 0xe2}, @IFA_BROADCAST={0x8, 0x4, @multicast2}, @IFA_FLAGS={0x8, 0x8, 0x10}, @IFA_BROADCAST={0x8, 0x4, @remote}, @IFA_BROADCAST={0x8, 0x4, @remote}, @IFA_FLAGS={0x8, 0x8, 0x40c}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0xc2182) dup3(r1, r2, 0x80000) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) [ 414.980366][T26688] FAULT_INJECTION: forcing a failure. [ 414.980366][T26688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.014051][T26680] loop5: detected capacity change from 0 to 8 [ 415.035298][T26680] MINIX-fs: bad superblock or unable to read bitmaps [ 415.045160][T26688] CPU: 1 PID: 26688 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 415.053955][T26688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.064086][T26688] Call Trace: [ 415.067373][T26688] dump_stack+0x137/0x19d [ 415.071747][T26688] should_fail+0x23c/0x250 [ 415.076161][T26688] should_fail_usercopy+0x16/0x20 [ 415.081180][T26688] strncpy_from_user+0x21/0x250 [ 415.086074][T26688] getname_flags+0xb8/0x3d0 [ 415.090600][T26688] do_mkdirat+0x3a/0x230 [ 415.094845][T26688] __x64_sys_mkdir+0x32/0x40 [ 415.099537][T26688] do_syscall_64+0x39/0x80 [ 415.103966][T26688] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 415.109876][T26688] RIP: 0033:0x465567 [ 415.113774][T26688] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 415.133418][T26688] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 415.141848][T26688] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 415.149867][T26688] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 415.157832][T26688] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 415.165796][T26688] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 415.173762][T26688] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:42 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:42 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:42 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x337, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='trusted\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000600)="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", 0x1000, 0xfffffffffffffff9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 415.342012][T26716] loop1: detected capacity change from 0 to 4 [ 415.362495][T26716] FAULT_INJECTION: forcing a failure. [ 415.362495][T26716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.380620][T26716] CPU: 0 PID: 26716 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 01:44:43 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) [ 415.389403][T26716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.399461][T26716] Call Trace: [ 415.402742][T26716] dump_stack+0x137/0x19d [ 415.407156][T26716] should_fail+0x23c/0x250 [ 415.411576][T26716] should_fail_usercopy+0x16/0x20 [ 415.416638][T26716] strncpy_from_user+0x21/0x250 [ 415.421489][T26716] getname_flags+0xb8/0x3d0 [ 415.426005][T26716] do_mkdirat+0x3a/0x230 [ 415.430300][T26716] __x64_sys_mkdir+0x32/0x40 [ 415.434899][T26716] do_syscall_64+0x39/0x80 01:44:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 415.439330][T26716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 415.445311][T26716] RIP: 0033:0x465567 [ 415.449231][T26716] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 415.468930][T26716] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 415.477466][T26716] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 415.485442][T26716] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 415.493423][T26716] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 415.501401][T26716] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 415.509378][T26716] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:43 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) 01:44:43 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) [ 415.606848][T26722] loop5: detected capacity change from 0 to 8 [ 415.621810][T26722] MINIX-fs: bad superblock or unable to read bitmaps 01:44:43 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x2040) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) [ 415.668561][T26722] loop5: detected capacity change from 0 to 8 [ 415.676960][T26722] MINIX-fs: bad superblock or unable to read bitmaps 01:44:43 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:43 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 415.759351][T26743] loop2: detected capacity change from 0 to 8 [ 415.774120][T26743] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 415.828100][T26749] loop1: detected capacity change from 0 to 4 01:44:43 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) [ 415.881078][T26749] FAULT_INJECTION: forcing a failure. [ 415.881078][T26749] name failslab, interval 1, probability 0, space 0, times 0 [ 415.894277][T26749] CPU: 0 PID: 26749 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 415.903064][T26749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.913152][T26749] Call Trace: [ 415.916446][T26749] dump_stack+0x137/0x19d [ 415.920791][T26749] should_fail+0x23c/0x250 [ 415.925216][T26749] __should_failslab+0x81/0x90 01:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) [ 415.929981][T26749] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 415.935744][T26749] should_failslab+0x5/0x20 [ 415.940260][T26749] __kmalloc+0x66/0x380 [ 415.944431][T26749] ? ext4_bread_batch+0x2b5/0x3e0 [ 415.949465][T26749] tomoyo_realpath_from_path+0x98/0x3b0 [ 415.955093][T26749] tomoyo_path_number_perm+0xc1/0x2d0 [ 415.960477][T26749] ? _raw_spin_unlock+0x22/0x40 [ 415.965344][T26749] ? __d_add+0x390/0x450 [ 415.969589][T26749] ? terminate_walk+0x24e/0x270 [ 415.974559][T26749] ? filename_create+0x36f/0x3c0 [ 415.979504][T26749] tomoyo_path_mkdir+0x50/0x70 [ 415.984350][T26749] security_path_mkdir+0x95/0xf0 [ 415.989377][T26749] do_mkdirat+0xf7/0x230 [ 415.993640][T26749] __x64_sys_mkdir+0x32/0x40 [ 415.998313][T26749] do_syscall_64+0x39/0x80 [ 416.002737][T26749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 416.008713][T26749] RIP: 0033:0x465567 01:44:43 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 416.012607][T26749] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 416.032279][T26749] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 416.040713][T26749] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 416.048691][T26749] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 416.056666][T26749] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 416.064643][T26749] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 416.072621][T26749] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:43 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:43 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='numa_maps\x00') write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x7cb8, 0x8001, "bea01ac00dbfeb9767f3e319f7347bdc9761fe2b3464b07c1f4af1d8bbb9785dd1d47d97286d8639a4f690d55217139f4e6b8d0c144c782cb2f075b96f9496646a6ddb716d87d091fb1cedc4c3bb5d44e6e37512b3d5fdcd283df255e9d77124bc902bcd4110761f397090e130479aa207275625d2879362df0c11fe80910f9ab55d0a3161da4908e3bafec9305636834b0f7a0789e8f5d42eb4664c3643c414636ac8d2e0519e511a29d32a1df35f18659c094a6277a71fe41284526eff6d2151505df602e29d9666a1466e95cbb30e052039a91d811afdd27d7be8a290ea6004f8b7729a388f8104c01a6202a01346f0b4efcdb7d783030c4b03e1ac8433b5", 0xf9, 0x2, 0x1f, 0x5, 0x8, 0x7, 0x3, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 416.123213][T26758] loop5: detected capacity change from 0 to 8 [ 416.145390][T26762] loop2: detected capacity change from 0 to 8 [ 416.147045][T26749] ERROR: Out of memory at tomoyo_realpath_from_path. [ 416.156690][T26762] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 01:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "8db9f840ebfd1e9a60f209263b809e32740ffe9387d920d6fd7e488f8043c5a52e1e6cb5a30eccd2d4156bc9a090c96a9bbf9c51b2473c755dee9a05c062be14b7a00e89a51967b987e3e6e1feeb9a8ab5031ccb107eac8a1cabe2ea5e3669b5c17dc621eff121a10998001d6af134b713b8b7acfa9569f270d32175cf8364b5d1c23cc393847572c4e6663c8ecdc2f2607fd2681835a6c2bf111b04be63f7e08b5014ce07d795f9a4a033b06224e4e7fc0fc1d20e12c0c48f3104f5b72e8104352099c797824e237ae8a620c9b91546388fe0da8101e7b93b24f4d2cfdd810d525637d22780a8304defbf6edc39bb8d031a113b920aeb4ab10d413b35931e21"}}, 0x110) [ 416.193810][T26758] MINIX-fs: bad superblock or unable to read bitmaps [ 416.230389][T26749] MINIX-fs: bad superblock or unable to read bitmaps 01:44:43 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:43 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:43 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[@ANYBLOB="f8"]) 01:44:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) [ 416.296022][T26758] loop5: detected capacity change from 0 to 8 [ 416.312941][T26758] MINIX-fs: bad superblock or unable to read bitmaps [ 416.375909][T26789] loop1: detected capacity change from 0 to 4 [ 416.382611][T26789] FAULT_INJECTION: forcing a failure. [ 416.382611][T26789] name failslab, interval 1, probability 0, space 0, times 0 [ 416.395874][T26789] CPU: 1 PID: 26789 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 416.404662][T26789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.414798][T26789] Call Trace: [ 416.418084][T26789] dump_stack+0x137/0x19d [ 416.422470][T26789] should_fail+0x23c/0x250 [ 416.426997][T26789] __should_failslab+0x81/0x90 [ 416.431828][T26789] ? tomoyo_encode2+0x1d3/0x350 [ 416.436689][T26789] should_failslab+0x5/0x20 [ 416.441238][T26789] __kmalloc+0x66/0x380 [ 416.442766][T26794] loop2: detected capacity change from 0 to 8 [ 416.445408][T26789] tomoyo_encode2+0x1d3/0x350 [ 416.456139][T26789] tomoyo_realpath_from_path+0x35e/0x3b0 [ 416.461898][T26789] tomoyo_path_number_perm+0xc1/0x2d0 [ 416.467340][T26789] ? _raw_spin_unlock+0x22/0x40 [ 416.472206][T26789] ? __d_add+0x390/0x450 [ 416.476515][T26789] ? terminate_walk+0x24e/0x270 [ 416.481376][T26789] ? filename_create+0x36f/0x3c0 [ 416.486320][T26789] tomoyo_path_mkdir+0x50/0x70 [ 416.491171][T26789] security_path_mkdir+0x95/0xf0 [ 416.496114][T26789] do_mkdirat+0xf7/0x230 [ 416.500367][T26789] __x64_sys_mkdir+0x32/0x40 [ 416.504991][T26789] do_syscall_64+0x39/0x80 [ 416.509412][T26789] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 416.515352][T26789] RIP: 0033:0x465567 [ 416.519275][T26789] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 416.538910][T26789] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 416.547337][T26789] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 416.548137][T26794] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 416.555407][T26789] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 416.555423][T26789] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 416.579324][T26789] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 416.587301][T26789] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:44 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x78fc0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x111, 0xa}}, 0x20) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="24fb0c692f951eccc18cf03ff9c37129b4219542d833495b43a405a80ed37908927abdf9669b6be8e67181b2c3af217cee19cb31d723f71d8e9b5523132d801cd3", 0x41, 0xfffffffffffffffb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r3, 0x0, r5, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r3, r4) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000380)) request_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000500)="15d22f0fb168cd0dadf54409fd71c7e4bf4a9219ce98babc6fe859f9dc2beb734a55ac3c152825bc9c9f7688bda1d95f21b2f15807b8aee6bcda63ef97019a0acd0dc9585a040b9babdd70", 0x4b, r1) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000440)='keyring\x00', r6) 01:44:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) 01:44:44 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:44:44 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) 01:44:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) [ 416.735224][T26789] ERROR: Out of memory at tomoyo_realpath_from_path. [ 416.766901][T26811] loop5: detected capacity change from 0 to 8 [ 416.775186][T26813] loop2: detected capacity change from 0 to 8 01:44:44 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) [ 416.782937][T26789] MINIX-fs: bad superblock or unable to read bitmaps [ 416.801739][T26811] MINIX-fs: bad superblock or unable to read bitmaps 01:44:44 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) 01:44:44 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:44 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) [ 416.930495][T26811] loop5: detected capacity change from 0 to 8 [ 416.943405][T26811] MINIX-fs: bad superblock or unable to read bitmaps 01:44:44 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:44 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:44 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "8db9f840ebfd1e9a60f209263b809e32740ffe9387d920d6fd7e488f8043c5a52e1e6cb5a30eccd2d4156bc9a090c96a9bbf9c51b2473c755dee9a05c062be14b7a00e89a51967b987e3e6e1feeb9a8ab5031ccb107eac8a1cabe2ea5e3669b5c17dc621eff121a10998001d6af134b713b8b7acfa9569f270d32175cf8364b5d1c23cc393847572c4e6663c8ecdc2f2607fd2681835a6c2bf111b04be63f7e08b5014ce07d795f9a4a033b06224e4e7fc0fc1d20e12c0c48f3104f5b72e8104352099c797824e237ae8a620c9b91546388fe0da8101e7b93b24f4d2cfdd810d525637d22780a8304defbf6edc39bb8d031a113b920aeb4ab10d413b35931e21"}}, 0x110) [ 417.043228][T26831] loop1: detected capacity change from 0 to 4 [ 417.068417][T26831] FAULT_INJECTION: forcing a failure. [ 417.068417][T26831] name failslab, interval 1, probability 0, space 0, times 0 [ 417.085005][T26832] loop2: detected capacity change from 0 to 8 01:44:44 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 417.129689][T26843] loop5: detected capacity change from 0 to 8 [ 417.131625][T26831] CPU: 0 PID: 26831 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 417.144712][T26831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.154766][T26831] Call Trace: [ 417.158355][T26831] dump_stack+0x137/0x19d [ 417.159249][T26843] MINIX-fs: bad superblock or unable to read bitmaps [ 417.162687][T26831] should_fail+0x23c/0x250 [ 417.162711][T26831] ? ext4_alloc_inode+0x27/0x300 01:44:44 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) 01:44:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "8db9f840ebfd1e9a60f209263b809e32740ffe9387d920d6fd7e488f8043c5a52e1e6cb5a30eccd2d4156bc9a090c96a9bbf9c51b2473c755dee9a05c062be14b7a00e89a51967b987e3e6e1feeb9a8ab5031ccb107eac8a1cabe2ea5e3669b5c17dc621eff121a10998001d6af134b713b8b7acfa9569f270d32175cf8364b5d1c23cc393847572c4e6663c8ecdc2f2607fd2681835a6c2bf111b04be63f7e08b5014ce07d795f9a4a033b06224e4e7fc0fc1d20e12c0c48f3104f5b72e8104352099c797824e237ae8a620c9b91546388fe0da8101e7b93b24f4d2cfdd810d525637d22780a8304defbf6edc39bb8d031a113b920aeb4ab10d413b35931e21"}}, 0x110) [ 417.178713][T26831] __should_failslab+0x81/0x90 [ 417.183554][T26831] ? set_qf_name+0x230/0x230 [ 417.188150][T26831] should_failslab+0x5/0x20 [ 417.192724][T26831] kmem_cache_alloc+0x46/0x320 [ 417.197524][T26831] ? set_qf_name+0x230/0x230 [ 417.202125][T26831] ext4_alloc_inode+0x27/0x300 [ 417.206897][T26831] ? set_qf_name+0x230/0x230 [ 417.211491][T26831] new_inode_pseudo+0x38/0x190 [ 417.216260][T26831] new_inode+0x21/0x100 [ 417.220435][T26831] __ext4_new_inode+0x132/0x2fe0 01:44:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) [ 417.225904][T26831] ? __dquot_initialize+0x130/0x750 [ 417.231133][T26831] ? make_kuid+0x121/0x180 [ 417.235597][T26831] ext4_mkdir+0x28a/0x760 [ 417.239937][T26831] vfs_mkdir+0x135/0x1f0 [ 417.244212][T26831] do_mkdirat+0x147/0x230 [ 417.248584][T26831] __x64_sys_mkdir+0x32/0x40 [ 417.253245][T26831] do_syscall_64+0x39/0x80 [ 417.257662][T26831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 417.263599][T26831] RIP: 0033:0x465567 01:44:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) 01:44:44 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) [ 417.267487][T26831] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 417.287103][T26831] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 417.295704][T26831] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 417.303695][T26831] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 417.311663][T26831] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 417.319709][T26831] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 01:44:45 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, 0x0) [ 417.327683][T26831] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 417.381770][T26843] loop5: detected capacity change from 0 to 8 [ 417.421153][T26843] MINIX-fs: bad superblock or unable to read bitmaps 01:44:45 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:45 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "8db9f840ebfd1e9a60f209263b809e32740ffe9387d920d6fd7e488f8043c5a52e1e6cb5a30eccd2d4156bc9a090c96a9bbf9c51b2473c755dee9a05c062be14b7a00e89a51967b987e3e6e1feeb9a8ab5031ccb107eac8a1cabe2ea5e3669b5c17dc621eff121a10998001d6af134b713b8b7acfa9569f270d32175cf8364b5d1c23cc393847572c4e6663c8ecdc2f2607fd2681835a6c2bf111b04be63f7e08b5014ce07d795f9a4a033b06224e4e7fc0fc1d20e12c0c48f3104f5b72e8104352099c797824e237ae8a620c9b91546388fe0da8101e7b93b24f4d2cfdd810d525637d22780a8304defbf6edc39bb8d031a113b920aeb4ab10d413b35931e21"}}, 0x110) 01:44:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r3}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r4, 0x0, r6, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r4, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x11d842afd9adbc3e, 0x0, [0x3, 0x101, 0xffff, 0xd, 0x0, 0x1, 0x1ff, 0x800, 0x1, 0x7c, 0x1f, 0x400, 0x8, 0x4, 0x3, 0x7]}, {0x20, 0x0, [0x7a, 0x8735, 0x2, 0x8, 0xddd8, 0x7, 0x40, 0x4, 0x0, 0x1, 0xfffffffc, 0xc607, 0x8, 0x5, 0x8, 0x46c0]}], r7, 0x1, 0x1, 0x90}}, 0x20) 01:44:45 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:45 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:45 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:45 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "4aada9", "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"}}, 0x110) [ 417.635711][T26877] loop1: detected capacity change from 0 to 4 [ 417.649596][T26877] FAULT_INJECTION: forcing a failure. [ 417.649596][T26877] name failslab, interval 1, probability 0, space 0, times 0 [ 417.667712][T26886] loop5: detected capacity change from 0 to 8 [ 417.677810][T26882] loop2: detected capacity change from 0 to 8 [ 417.679206][T26886] MINIX-fs: bad superblock or unable to read bitmaps [ 417.702266][T26877] CPU: 1 PID: 26877 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 417.711092][T26877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.721153][T26877] Call Trace: [ 417.724443][T26877] dump_stack+0x137/0x19d [ 417.728809][T26877] should_fail+0x23c/0x250 [ 417.733328][T26877] ? security_inode_alloc+0x30/0x180 [ 417.738632][T26877] __should_failslab+0x81/0x90 [ 417.743494][T26877] should_failslab+0x5/0x20 [ 417.748015][T26877] kmem_cache_alloc+0x46/0x320 [ 417.749485][T26882] MINIX-fs: bad superblock or unable to read bitmaps [ 417.752886][T26877] security_inode_alloc+0x30/0x180 [ 417.766169][T26877] inode_init_always+0x222/0x440 [ 417.771134][T26877] ? set_qf_name+0x230/0x230 [ 417.775728][T26877] new_inode_pseudo+0x6f/0x190 [ 417.780494][T26877] new_inode+0x21/0x100 [ 417.784651][T26877] __ext4_new_inode+0x132/0x2fe0 [ 417.789714][T26877] ? __dquot_initialize+0x130/0x750 [ 417.795003][T26877] ? make_kuid+0x121/0x180 [ 417.799494][T26877] ext4_mkdir+0x28a/0x760 [ 417.803838][T26877] vfs_mkdir+0x135/0x1f0 [ 417.808182][T26877] do_mkdirat+0x147/0x230 [ 417.812517][T26877] __x64_sys_mkdir+0x32/0x40 [ 417.817124][T26877] do_syscall_64+0x39/0x80 [ 417.821551][T26877] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 417.827458][T26877] RIP: 0033:0x465567 [ 417.831354][T26877] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 417.851013][T26877] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 417.859460][T26877] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 417.867462][T26877] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 417.875456][T26877] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff 01:44:45 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 01:44:45 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 417.883431][T26877] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 417.891413][T26877] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000600)="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", 0x1000, r1) add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) 01:44:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) [ 417.992623][T26886] loop5: detected capacity change from 0 to 8 [ 418.024318][T26886] MINIX-fs: bad superblock or unable to read bitmaps 01:44:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:45 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:45 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 418.107523][T26912] loop1: detected capacity change from 0 to 4 [ 418.114347][T26912] FAULT_INJECTION: forcing a failure. [ 418.114347][T26912] name failslab, interval 1, probability 0, space 0, times 0 01:44:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) [ 418.148119][T26918] loop5: detected capacity change from 0 to 8 [ 418.159973][T26918] MINIX-fs: bad superblock or unable to read bitmaps [ 418.212681][T26912] CPU: 0 PID: 26912 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 418.221530][T26912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.231587][T26912] Call Trace: [ 418.234869][T26912] dump_stack+0x137/0x19d [ 418.239209][T26912] should_fail+0x23c/0x250 [ 418.243806][T26912] ? security_inode_alloc+0x30/0x180 [ 418.249092][T26912] __should_failslab+0x81/0x90 [ 418.253856][T26912] should_failslab+0x5/0x20 [ 418.258361][T26912] kmem_cache_alloc+0x46/0x320 [ 418.263184][T26912] security_inode_alloc+0x30/0x180 [ 418.268332][T26912] inode_init_always+0x222/0x440 [ 418.273306][T26912] ? set_qf_name+0x230/0x230 [ 418.277888][T26912] new_inode_pseudo+0x6f/0x190 [ 418.282651][T26912] new_inode+0x21/0x100 [ 418.286803][T26912] __ext4_new_inode+0x132/0x2fe0 [ 418.291806][T26912] ? __dquot_initialize+0x130/0x750 [ 418.297019][T26912] ? make_kuid+0x121/0x180 [ 418.301437][T26912] ext4_mkdir+0x28a/0x760 [ 418.305779][T26912] vfs_mkdir+0x135/0x1f0 [ 418.310021][T26912] do_mkdirat+0x147/0x230 [ 418.314431][T26912] __x64_sys_mkdir+0x32/0x40 [ 418.319117][T26912] do_syscall_64+0x39/0x80 [ 418.323537][T26912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 418.329490][T26912] RIP: 0033:0x465567 [ 418.333377][T26912] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 418.353163][T26912] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 01:44:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r2 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='encrypted\x00', r1) keyctl$chown(0x4, r2, 0xee00, 0xee01) [ 418.361583][T26912] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 418.369558][T26912] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 418.377530][T26912] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 418.385501][T26912] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 418.393468][T26912] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r2, 0x8, "4aada9", "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"}}, 0x110) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 01:44:46 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:46 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:46 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:46 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "4aada9", "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"}}, 0x110) [ 418.663255][T26918] loop5: detected capacity change from 0 to 8 [ 418.689287][T26918] MINIX-fs: bad superblock or unable to read bitmaps [ 418.717882][T26945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 418.732961][T26945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 418.767944][T26945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 418.778521][T26949] loop1: detected capacity change from 0 to 4 [ 418.787720][T26949] FAULT_INJECTION: forcing a failure. [ 418.787720][T26949] name failslab, interval 1, probability 0, space 0, times 0 [ 418.800520][T26949] CPU: 0 PID: 26949 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 418.800539][T26945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 418.800557][T26945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 418.809288][T26949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.809350][T26949] Call Trace: [ 418.809361][T26949] dump_stack+0x137/0x19d [ 418.820469][T26945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 418.829643][T26949] should_fail+0x23c/0x250 [ 418.829673][T26949] ? __es_insert_extent+0x546/0xe80 01:44:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r7}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)=0x0) syz_io_uring_submit(r8, r10, &(0x7f0000000700)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r6, 0x1000, 0x0, 0x6, 0x2}, 0x1) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd_index=0x4, 0x100000001, 0x0, 0xffffffff, 0x3, 0x1}, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f00000005c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0xfffffffe) [ 418.829695][T26949] __should_failslab+0x81/0x90 [ 418.829714][T26949] should_failslab+0x5/0x20 [ 418.840229][T26945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 418.843190][T26949] kmem_cache_alloc+0x46/0x320 [ 418.843216][T26949] __es_insert_extent+0x546/0xe80 [ 418.847840][T26945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 418.857336][T26949] ? __kmalloc+0x1e5/0x380 [ 418.857361][T26949] ? kcalloc+0x32/0x50 [ 418.857380][T26949] ext4_es_insert_extent+0x1bb/0x1a80 [ 418.861995][T26945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 418.866972][T26949] ? ext4_ext_convert_to_initialized+0x1000/0x1000 [ 418.871869][T26945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 418.876223][T26949] ext4_ext_map_blocks+0xf84/0x1fd0 [ 418.951941][T26949] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 418.958023][T26949] ? __down_read_common+0x14e/0x510 [ 418.963233][T26949] ? percpu_counter_add_batch+0xe8/0x110 [ 418.968876][T26949] ? ext4_es_lookup_extent+0x221/0x500 [ 418.974365][T26949] ext4_map_blocks+0x1d1/0xff0 [ 418.979144][T26949] ? __ext4_mark_inode_dirty+0x4f1/0x5e0 [ 418.984793][T26949] ext4_getblk+0xb1/0x3d0 [ 418.989120][T26949] ? __ext4_new_inode+0x2b07/0x2fe0 [ 418.994371][T26949] ext4_bread+0x28/0x130 [ 418.998620][T26949] ext4_append+0xd1/0x1c0 [ 419.002960][T26949] ext4_init_new_dir+0x177/0x500 [ 419.007933][T26949] ext4_mkdir+0x329/0x760 [ 419.012343][T26949] vfs_mkdir+0x135/0x1f0 [ 419.016595][T26949] do_mkdirat+0x147/0x230 [ 419.020935][T26949] __x64_sys_mkdir+0x32/0x40 [ 419.025610][T26949] do_syscall_64+0x39/0x80 [ 419.030032][T26949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 419.035944][T26949] RIP: 0033:0x465567 [ 419.039871][T26949] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 419.059483][T26949] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 419.068650][T26949] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 419.076662][T26949] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 419.084674][T26949] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 419.092756][T26949] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 419.100895][T26949] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:46 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:46 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:46 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "4aada9", "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"}}, 0x110) 01:44:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="2735aa123bc544f7f8a1a5fe9c07df0fd97b65f6aea3871365a4c61b3d8052c594704c0dbb07432c9b55b7b93131e7518dd0cbde47481716ae9dd555f10989b8ed44f08213af6893348edbead00f3aac651182703cf3c983216987905b322416ad3285d83b90757e5c4ef3911f3e9ffb09ac75c4b17ff643795d17baecfeabe4180df662e6d632a06e53183b7d8ee5ecdd34287b0c903cdeec1f288c97acce066b1e1d7f", 0xa4, r1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) keyctl$chown(0x4, r2, r3, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:46 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:46 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r7}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)=0x0) syz_io_uring_submit(r8, r10, &(0x7f0000000700)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r6, 0x1000, 0x0, 0x6, 0x2}, 0x1) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd_index=0x4, 0x100000001, 0x0, 0xffffffff, 0x3, 0x1}, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f00000005c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0xfffffffe) [ 419.263775][T26971] loop5: detected capacity change from 0 to 8 [ 419.288825][T26971] MINIX-fs: bad superblock or unable to read bitmaps [ 419.368444][T26949] MINIX-fs: bad superblock or unable to read bitmaps [ 419.388131][T26971] loop5: detected capacity change from 0 to 8 [ 419.429326][T26971] MINIX-fs: bad superblock or unable to read bitmaps 01:44:47 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:47 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:47 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) 01:44:47 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r7}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)=0x0) syz_io_uring_submit(r8, r10, &(0x7f0000000700)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r6, 0x1000, 0x0, 0x6, 0x2}, 0x1) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd_index=0x4, 0x100000001, 0x0, 0xffffffff, 0x3, 0x1}, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f00000005c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0xfffffffe) 01:44:47 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 419.672321][T27001] loop5: detected capacity change from 0 to 8 01:44:47 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:47 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) request_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)='encrypted\x00', 0xfffffffffffffffe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = socket$can_bcm(0x1d, 0x2, 0x2) readv(r3, &(0x7f0000000400)=[{&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000300)=""/177, 0xb1}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/131, 0x83}], 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0)=0x7, r2, 0x0, 0x0, 0x1}}, 0x20) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r4) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000000)='syz', r4) 01:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r7}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)=0x0) syz_io_uring_submit(r8, r10, &(0x7f0000000700)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r6, 0x1000, 0x0, 0x6, 0x2}, 0x1) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd_index=0x4, 0x100000001, 0x0, 0xffffffff, 0x3, 0x1}, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f00000005c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0xfffffffe) [ 419.722524][T27001] MINIX-fs: bad superblock or unable to read bitmaps [ 419.751420][T27004] loop1: detected capacity change from 0 to 4 01:44:47 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) [ 419.819503][T27004] FAULT_INJECTION: forcing a failure. [ 419.819503][T27004] name failslab, interval 1, probability 0, space 0, times 0 [ 419.847859][T27001] loop5: detected capacity change from 0 to 8 [ 419.870527][T27001] MINIX-fs: bad superblock or unable to read bitmaps [ 419.922120][T27004] CPU: 0 PID: 27004 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 419.930950][T27004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.941129][T27004] Call Trace: [ 419.944492][T27004] dump_stack+0x137/0x19d [ 419.948839][T27004] should_fail+0x23c/0x250 [ 419.953267][T27004] __should_failslab+0x81/0x90 [ 419.958034][T27004] ? kcalloc+0x32/0x50 [ 419.962111][T27004] should_failslab+0x5/0x20 [ 419.966633][T27004] __kmalloc+0x66/0x380 [ 419.970789][T27004] ? kcalloc+0x32/0x50 [ 419.974889][T27004] kcalloc+0x32/0x50 [ 419.978859][T27004] ext4_find_extent+0x21c/0x7f0 [ 419.983782][T27004] ? kfree+0xf0/0x1e0 [ 419.987766][T27004] ext4_ext_map_blocks+0xd9/0x1fd0 [ 419.992939][T27004] ? __ext4_handle_dirty_metadata+0x20c/0x590 [ 419.999020][T27004] ? __down_write_common+0x45/0x870 [ 420.004313][T27004] ? __down_read_common+0x14e/0x510 [ 420.009517][T27004] ? percpu_counter_add_batch+0xe8/0x110 [ 420.015161][T27004] ? ext4_es_lookup_extent+0x221/0x500 [ 420.020643][T27004] ext4_map_blocks+0x726/0xff0 [ 420.025478][T27004] ? __ext4_mark_inode_dirty+0x4f1/0x5e0 [ 420.031213][T27004] ext4_getblk+0xb1/0x3d0 [ 420.035546][T27004] ext4_bread+0x28/0x130 [ 420.039837][T27004] ext4_append+0xd1/0x1c0 [ 420.044174][T27004] ext4_init_new_dir+0x177/0x500 [ 420.049314][T27004] ext4_mkdir+0x329/0x760 [ 420.053661][T27004] vfs_mkdir+0x135/0x1f0 [ 420.057911][T27004] do_mkdirat+0x147/0x230 [ 420.062246][T27004] __x64_sys_mkdir+0x32/0x40 [ 420.066850][T27004] do_syscall_64+0x39/0x80 [ 420.071277][T27004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 420.077229][T27004] RIP: 0033:0x465567 [ 420.081129][T27004] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 420.100746][T27004] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 420.109195][T27004] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 01:44:47 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r7}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)=0x0) syz_io_uring_submit(r8, r10, &(0x7f0000000700)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r6, 0x1000, 0x0, 0x6, 0x2}, 0x1) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd_index=0x4, 0x100000001, 0x0, 0xffffffff, 0x3, 0x1}, 0x0) [ 420.117177][T27004] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 420.125156][T27004] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 420.133144][T27004] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 420.141121][T27004] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:47 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:47 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r7}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000700)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r6, 0x1000, 0x0, 0x6, 0x2}, 0x1) 01:44:47 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) 01:44:47 executing program 0: preadv2(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) [ 420.338525][T27039] loop5: detected capacity change from 0 to 8 [ 420.352309][T27039] MINIX-fs: bad superblock or unable to read bitmaps 01:44:48 executing program 0: preadv2(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:48 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) [ 420.394610][T27046] loop1: detected capacity change from 0 to 4 [ 420.402623][T27046] FAULT_INJECTION: forcing a failure. [ 420.402623][T27046] name failslab, interval 1, probability 0, space 0, times 0 [ 420.417248][T27046] CPU: 0 PID: 27046 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 420.426031][T27046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.436095][T27046] Call Trace: [ 420.439423][T27046] dump_stack+0x137/0x19d [ 420.443782][T27046] should_fail+0x23c/0x250 [ 420.448203][T27046] ? ext4_mb_new_blocks+0x2dc/0x1150 [ 420.453502][T27046] __should_failslab+0x81/0x90 [ 420.458276][T27046] should_failslab+0x5/0x20 [ 420.462794][T27046] kmem_cache_alloc+0x46/0x320 [ 420.467595][T27046] ext4_mb_new_blocks+0x2dc/0x1150 [ 420.472720][T27046] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 420.478526][T27046] ext4_ext_map_blocks+0x146f/0x1fd0 [ 420.483872][T27046] ? percpu_counter_add_batch+0xe8/0x110 [ 420.489529][T27046] ? ext4_es_lookup_extent+0x221/0x500 [ 420.495006][T27046] ext4_map_blocks+0x726/0xff0 [ 420.499772][T27046] ? __ext4_mark_inode_dirty+0x4f1/0x5e0 [ 420.505435][T27046] ext4_getblk+0xb1/0x3d0 [ 420.509769][T27046] ext4_bread+0x28/0x130 [ 420.514022][T27046] ext4_append+0xd1/0x1c0 [ 420.518358][T27046] ext4_init_new_dir+0x177/0x500 [ 420.523303][T27046] ext4_mkdir+0x329/0x760 [ 420.527684][T27046] vfs_mkdir+0x135/0x1f0 [ 420.531941][T27046] do_mkdirat+0x147/0x230 [ 420.536290][T27046] __x64_sys_mkdir+0x32/0x40 [ 420.540886][T27046] do_syscall_64+0x39/0x80 [ 420.545320][T27046] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 420.551226][T27046] RIP: 0033:0x465567 [ 420.555127][T27046] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 420.574745][T27046] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 420.583164][T27046] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 420.591142][T27046] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 420.599121][T27046] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 420.607121][T27046] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 420.615170][T27046] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 420.623573][T27039] loop5: detected capacity change from 0 to 8 01:44:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:48 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) 01:44:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:48 executing program 0: preadv2(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:48 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:48 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:48 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) 01:44:48 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 420.817371][T27071] loop1: detected capacity change from 0 to 4 [ 420.824417][T27074] loop5: detected capacity change from 0 to 8 [ 420.843713][T27071] FAULT_INJECTION: forcing a failure. [ 420.843713][T27071] name failslab, interval 1, probability 0, space 0, times 0 [ 420.858521][T27074] MINIX-fs: bad superblock or unable to read bitmaps 01:44:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 420.900897][T27071] CPU: 0 PID: 27071 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 420.909700][T27071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.919763][T27071] Call Trace: [ 420.923042][T27071] dump_stack+0x137/0x19d [ 420.927381][T27071] should_fail+0x23c/0x250 [ 420.931801][T27071] ? ext4_mb_new_blocks+0x6af/0x1150 [ 420.937163][T27071] __should_failslab+0x81/0x90 [ 420.941928][T27071] should_failslab+0x5/0x20 [ 420.946489][T27071] kmem_cache_alloc+0x46/0x320 01:44:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 420.951320][T27071] ext4_mb_new_blocks+0x6af/0x1150 [ 420.956456][T27071] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 420.962188][T27071] ext4_ext_map_blocks+0x146f/0x1fd0 [ 420.967658][T27071] ? percpu_counter_add_batch+0xe8/0x110 [ 420.973297][T27071] ? ext4_es_lookup_extent+0x221/0x500 [ 420.978789][T27071] ext4_map_blocks+0x726/0xff0 [ 420.983562][T27071] ? __ext4_mark_inode_dirty+0x4f1/0x5e0 [ 420.989211][T27071] ext4_getblk+0xb1/0x3d0 [ 420.993541][T27071] ext4_bread+0x28/0x130 [ 420.997785][T27071] ext4_append+0xd1/0x1c0 [ 421.002169][T27071] ext4_init_new_dir+0x177/0x500 [ 421.007123][T27071] ext4_mkdir+0x329/0x760 [ 421.011458][T27071] vfs_mkdir+0x135/0x1f0 [ 421.015703][T27071] do_mkdirat+0x147/0x230 [ 421.020045][T27071] __x64_sys_mkdir+0x32/0x40 [ 421.024634][T27071] do_syscall_64+0x39/0x80 [ 421.029067][T27071] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 421.034976][T27071] RIP: 0033:0x465567 01:44:48 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 421.038931][T27071] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 421.058649][T27071] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 421.067251][T27071] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 421.075261][T27071] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 421.083240][T27071] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 421.091407][T27071] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 01:44:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 421.099476][T27071] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x0, 0x8}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 421.174061][T27074] loop5: detected capacity change from 0 to 8 [ 421.199406][T27074] MINIX-fs: bad superblock or unable to read bitmaps 01:44:48 executing program 2: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) 01:44:48 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:48 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 421.361721][T27116] loop5: detected capacity change from 0 to 8 [ 421.370645][T27116] MINIX-fs: bad superblock or unable to read bitmaps 01:44:49 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000180)='\xe7\xf2\x94\xb2;\xf2\x04\xb8\\\x8dT\x84\x18&H\xa2\xed\xdaDT\xae\x01\xf0u\x11\x8d\xce\xbe_@\x8c!\xec\x12\xffrSD\xfb?\xe4\xa3\xa0\xd4!>9\x87Hdg\x96d\x0e\x1b\xe0\xf2\x1b\x9e\xa7\x03\x9d\xce\xd3v\xcd\x16\x9f\x897\x9c\xecPP\xe9*\xc8^N\xcd#\x85#6@Z\x92\xddq\x1d\xe1\xdeb\xac\xe6}\xa3^\x9a\xc4\xfd\fx\xbd@3\x85t\x87\xa0\xaeN\x85@<\x10\xff\x17\xf1n\x8d)\xca7\xee\xc0f\f\xfe\xba\xe7?\x86>rbG\xa4LW\xf4Q\xd5\xa2\x91b]\x8c\xa2\xbc\xe8', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) r4 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x4000, 0x111) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r4}}, 0x18) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000600)="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", 0x1000, 0x0) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:49 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:49 executing program 2: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) 01:44:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 421.436199][T27116] loop5: detected capacity change from 0 to 8 [ 421.462648][T27116] MINIX-fs: bad superblock or unable to read bitmaps 01:44:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) 01:44:49 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:49 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='-@%{*(\x83\x00', 0xfffffffffffffffe) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) [ 421.580016][T27137] loop1: detected capacity change from 0 to 4 [ 421.627368][T27137] FAULT_INJECTION: forcing a failure. [ 421.627368][T27137] name failslab, interval 1, probability 0, space 0, times 0 [ 421.659223][T27137] CPU: 0 PID: 27137 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 421.668091][T27137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.678212][T27137] Call Trace: [ 421.681517][T27137] dump_stack+0x137/0x19d [ 421.685333][T27145] loop5: detected capacity change from 0 to 8 [ 421.685876][T27137] should_fail+0x23c/0x250 [ 421.696444][T27137] ? ext4_mb_new_blocks+0x6af/0x1150 [ 421.701785][T27137] __should_failslab+0x81/0x90 [ 421.706555][T27137] should_failslab+0x5/0x20 [ 421.711097][T27137] kmem_cache_alloc+0x46/0x320 [ 421.715916][T27137] ext4_mb_new_blocks+0x6af/0x1150 [ 421.721036][T27137] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 421.726986][T27137] ext4_ext_map_blocks+0x146f/0x1fd0 [ 421.727444][T27145] MINIX-fs: bad superblock or unable to read bitmaps [ 421.732279][T27137] ? percpu_counter_add_batch+0xe8/0x110 [ 421.732306][T27137] ? ext4_es_lookup_extent+0x221/0x500 [ 421.750029][T27137] ext4_map_blocks+0x726/0xff0 [ 421.754801][T27137] ? __ext4_mark_inode_dirty+0x4f1/0x5e0 [ 421.760448][T27137] ext4_getblk+0xb1/0x3d0 [ 421.764831][T27137] ext4_bread+0x28/0x130 [ 421.769073][T27137] ext4_append+0xd1/0x1c0 [ 421.773500][T27137] ext4_init_new_dir+0x177/0x500 [ 421.778447][T27137] ext4_mkdir+0x329/0x760 [ 421.782819][T27137] vfs_mkdir+0x135/0x1f0 [ 421.787145][T27137] do_mkdirat+0x147/0x230 [ 421.791552][T27137] __x64_sys_mkdir+0x32/0x40 [ 421.796143][T27137] do_syscall_64+0x39/0x80 [ 421.800595][T27137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 421.806531][T27137] RIP: 0033:0x465567 01:44:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 421.810471][T27137] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 421.830181][T27137] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 421.838643][T27137] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465567 [ 421.846703][T27137] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 421.854682][T27137] RBP: 00007f50ffcfe040 R08: 0000000000000000 R09: ffffffffffffffff [ 421.862659][T27137] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 421.870633][T27137] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) [ 421.929590][T27145] loop5: detected capacity change from 0 to 8 [ 421.936661][T27145] MINIX-fs: bad superblock or unable to read bitmaps 01:44:49 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:49 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x8a482, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) 01:44:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5}}, 0x18) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:49 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:49 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, 0x0, 0x0, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 422.080197][T27172] loop5: detected capacity change from 0 to 8 01:44:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, 0x0) [ 422.137995][T27179] loop1: detected capacity change from 0 to 4 [ 422.145411][T27179] FAULT_INJECTION: forcing a failure. [ 422.145411][T27179] name failslab, interval 1, probability 0, space 0, times 0 [ 422.156832][T27172] MINIX-fs: bad superblock or unable to read bitmaps [ 422.158402][T27179] CPU: 0 PID: 27179 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 422.173472][T27179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.183551][T27179] Call Trace: 01:44:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 422.186830][T27179] dump_stack+0x137/0x19d [ 422.191172][T27179] should_fail+0x23c/0x250 [ 422.195599][T27179] __should_failslab+0x81/0x90 [ 422.200374][T27179] ? __se_sys_mount+0x4e/0x2e0 [ 422.205173][T27179] should_failslab+0x5/0x20 [ 422.209684][T27179] __kmalloc_track_caller+0x64/0x380 [ 422.215059][T27179] ? strnlen_user+0x137/0x1c0 [ 422.219766][T27179] strndup_user+0x73/0x120 [ 422.224341][T27179] __se_sys_mount+0x4e/0x2e0 [ 422.228934][T27179] ? mntput+0x45/0x70 [ 422.232928][T27179] ? __fpregs_load_activate+0x103/0x1f0 [ 422.238502][T27179] __x64_sys_mount+0x63/0x70 [ 422.243252][T27179] do_syscall_64+0x39/0x80 [ 422.247744][T27179] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 422.253648][T27179] RIP: 0033:0x46797a [ 422.257540][T27179] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 422.277148][T27179] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:44:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, 0x0) 01:44:49 executing program 3: ioctl$SNDCTL_SEQ_OUTOFBAND(0xffffffffffffffff, 0x40085112, &(0x7f0000000000)=@s={0x5, @SEQ_MIDIPUTC=0xd2, 0x19, 0x8}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) request_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0xfffffffffffffff9) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x10001, @empty, 0x8001}, {0xa, 0x0, 0x0, @dev, 0x40}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x40d, @private1, 0x8001}, {0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x29}, 0x10001}, r2, 0x1}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r2}}, 0x18) [ 422.285572][T27179] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 422.293556][T27179] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 422.301535][T27179] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 422.309513][T27179] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 422.317484][T27179] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:50 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, 0x0, 0x0, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 422.394716][T27172] loop5: detected capacity change from 0 to 8 [ 422.406246][T27172] MINIX-fs: bad superblock or unable to read bitmaps 01:44:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, 0x0) 01:44:50 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, 0x0, 0x0, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d1bd78", "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"}}, 0x110) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) finit_module(r1, &(0x7f0000000180)='\x00', 0x2) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000140)) 01:44:50 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:50 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xbdbee3bc89050d2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) r6 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 422.631275][T27219] loop5: detected capacity change from 0 to 8 [ 422.645149][T27220] loop1: detected capacity change from 0 to 4 [ 422.662386][T27219] MINIX-fs: bad superblock or unable to read bitmaps 01:44:50 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7fff}}, 0x10) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) syz_open_procfs(0x0, &(0x7f0000000040)='attr/exec\x00') r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {}, 0x8000}) [ 422.676731][T27220] FAULT_INJECTION: forcing a failure. [ 422.676731][T27220] name fail_usercopy, interval 1, probability 0, space 0, times 0 01:44:50 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 422.779076][T27220] CPU: 0 PID: 27220 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 422.787886][T27220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.797971][T27220] Call Trace: [ 422.801337][T27220] dump_stack+0x137/0x19d [ 422.805691][T27220] should_fail+0x23c/0x250 [ 422.810138][T27220] should_fail_usercopy+0x16/0x20 [ 422.815240][T27220] _copy_from_user+0x1c/0xd0 [ 422.819854][T27220] strndup_user+0xb0/0x120 [ 422.824283][T27220] __se_sys_mount+0x4e/0x2e0 01:44:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {}, 0x8000}) [ 422.828879][T27220] ? mntput+0x45/0x70 [ 422.832900][T27220] ? __fpregs_load_activate+0x103/0x1f0 [ 422.838453][T27220] __x64_sys_mount+0x63/0x70 [ 422.843051][T27220] do_syscall_64+0x39/0x80 [ 422.847474][T27220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 422.853463][T27220] RIP: 0033:0x46797a [ 422.857366][T27220] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 422.876990][T27220] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 422.885588][T27220] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 422.893580][T27220] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 422.901569][T27220] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 422.909696][T27220] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 422.917672][T27220] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 422.991366][T27219] loop5: detected capacity change from 0 to 8 [ 423.006388][T27219] MINIX-fs: bad superblock or unable to read bitmaps 01:44:51 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:51 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) r4 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r4}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {}, 0x8000}) 01:44:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='big_key\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x400000, 0x0) sendmsg$nl_netfilter(r6, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x12c, 0x7, 0x1, 0x5, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x6}, [@generic="fb7018d24f5dd16a5b1ea91aeeb02f257d650da2247f5c5868f759e0b4220b9ad875a3effe06768a963885a32a401bddeecc72c5e41a861b6859adfe277198629e69320d9ace7e", @nested={0xcf, 0x3f, 0x0, 0x1, [@generic="8ad9047b12297fb5820da09bce0ef07e67fcd988074690db79349301b8c0738f31ae3b51c3c22753e8bb56c9201a3c83852a312b12d86dbd1863c2ca8f0be20f103a54137f0dba5438a67a438154c595340313c2e09f7e919d5c2f289b1499bbcbe2ff14faae436d622c4868afd85bb133db33a25f4fa6fc8a83cad035231be6a190311a8fb380a4ce4bd959bfaf61c88b62f73e6f6370f796878255e032c1b6c2b8185fa386b14578d54ad536ceee515dc24718f777265ec4312392ac30be43afe8845531c139f5a67540"]}]}, 0x12c}}, 0x4000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) 01:44:51 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}}) [ 423.520967][T27258] loop5: detected capacity change from 0 to 8 01:44:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r3}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:51 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {0x0}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 423.578199][T27258] MINIX-fs: bad superblock or unable to read bitmaps 01:44:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r3}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 423.647694][T27258] loop5: detected capacity change from 0 to 8 [ 423.655089][T27263] loop1: detected capacity change from 0 to 4 [ 423.665618][T27263] FAULT_INJECTION: forcing a failure. [ 423.665618][T27263] name failslab, interval 1, probability 0, space 0, times 0 [ 423.684951][T27258] MINIX-fs: bad superblock or unable to read bitmaps 01:44:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) r2 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r2}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 423.722767][T27263] CPU: 0 PID: 27263 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 423.731671][T27263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.741726][T27263] Call Trace: [ 423.745007][T27263] dump_stack+0x137/0x19d [ 423.749349][T27263] should_fail+0x23c/0x250 [ 423.753777][T27263] __should_failslab+0x81/0x90 [ 423.758597][T27263] ? __se_sys_mount+0x91/0x2e0 [ 423.763436][T27263] should_failslab+0x5/0x20 [ 423.767961][T27263] __kmalloc_track_caller+0x64/0x380 [ 423.773251][T27263] ? strnlen_user+0x137/0x1c0 [ 423.777995][T27263] strndup_user+0x73/0x120 [ 423.782463][T27263] __se_sys_mount+0x91/0x2e0 [ 423.787056][T27263] ? mntput+0x45/0x70 [ 423.791077][T27263] ? __fpregs_load_activate+0x103/0x1f0 [ 423.796715][T27263] __x64_sys_mount+0x63/0x70 [ 423.801310][T27263] do_syscall_64+0x39/0x80 [ 423.805728][T27263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 423.811674][T27263] RIP: 0033:0x46797a [ 423.815570][T27263] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 423.835201][T27263] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 423.843625][T27263] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 423.851627][T27263] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 423.859657][T27263] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 423.867661][T27263] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 423.875674][T27263] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:51 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf31a103b7f95f7b8fb9e0fceee31ad40900dc1df302e4a9e396a870605838b580244dbe73fa0d8d00b0c3c2423b9c12c49452b7acdc2c1d289f6e5eca7747bd30324cd13d9a", 0xc1, r1) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, r1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r1}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:51 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) r4 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r4}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:51 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {0x0}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:51 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:51 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) r4 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r4}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 424.082036][T27300] loop1: detected capacity change from 0 to 4 [ 424.093005][T27299] loop5: detected capacity change from 0 to 8 [ 424.107846][T27300] FAULT_INJECTION: forcing a failure. [ 424.107846][T27300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 424.178823][T27300] CPU: 1 PID: 27300 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 424.187723][T27300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.197817][T27300] Call Trace: [ 424.201187][T27300] dump_stack+0x137/0x19d [ 424.205578][T27300] should_fail+0x23c/0x250 [ 424.210146][T27300] should_fail_usercopy+0x16/0x20 [ 424.215219][T27300] _copy_from_user+0x1c/0xd0 [ 424.219844][T27300] strndup_user+0xb0/0x120 [ 424.224284][T27300] __se_sys_mount+0x91/0x2e0 [ 424.228883][T27300] ? mntput+0x45/0x70 [ 424.232884][T27300] ? __fpregs_load_activate+0x103/0x1f0 [ 424.238466][T27300] __x64_sys_mount+0x63/0x70 [ 424.243082][T27300] do_syscall_64+0x39/0x80 [ 424.247519][T27300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 424.253434][T27300] RIP: 0033:0x46797a [ 424.257341][T27300] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 424.277140][T27300] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 424.285717][T27300] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 424.293699][T27300] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 424.301721][T27300] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 424.309698][T27300] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 424.317704][T27300] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 424.335723][T27299] MINIX-fs: bad superblock or unable to read bitmaps 01:44:52 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {0x0}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:52 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x1200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:52 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 424.534535][T27326] loop5: detected capacity change from 0 to 9 [ 424.544234][T27326] MINIX-fs: bad superblock or unable to read bitmaps 01:44:52 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:52 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:52 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) r4 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r4}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x24, 0x0, [0x101, 0x80, 0x3, 0x3f, 0x8, 0x8, 0xf38, 0xf0f, 0x3, 0xffff, 0x9, 0x3, 0x0, 0x5, 0x6, 0x10000]}, {0x6, 0x0, [0x1ff, 0x18, 0x2, 0x1, 0x18d7, 0xfffffc01, 0x1, 0x1000, 0x7, 0xdc4, 0x0, 0x1, 0x200, 0x21, 0x3, 0xe1a]}, {0x2, 0x0, [0x9, 0x20, 0x4, 0x0, 0xffff, 0xeb, 0x200, 0x7, 0x0, 0x6d1, 0x3ff, 0x4, 0x0, 0xff, 0x100, 0x14b0]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) r1 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3ff, @ipv4={[], [], @local}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:52 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:52 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x13d1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:52 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:52 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 424.756587][T27344] loop1: detected capacity change from 0 to 4 [ 424.773745][T27344] FAULT_INJECTION: forcing a failure. [ 424.773745][T27344] name failslab, interval 1, probability 0, space 0, times 0 01:44:52 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 424.802738][T27348] loop5: detected capacity change from 0 to 9 [ 424.811886][T27348] MINIX-fs: bad superblock or unable to read bitmaps [ 424.824594][T27344] CPU: 1 PID: 27344 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 424.833391][T27344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.843452][T27344] Call Trace: [ 424.846745][T27344] dump_stack+0x137/0x19d [ 424.851082][T27344] should_fail+0x23c/0x250 01:44:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x16c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x3) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x5, 0x400) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380), 0x2, 0x1}}, 0x20) r2 = socket$isdn(0x22, 0x3, 0x21) ftruncate(r2, 0x7) r3 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="0f6d77f309e42faeb3ac1f20b752b4efa47f6fd7d6c9ef6dc4d7b91f86e1a1814dfacd3e5361710a720709faf70b35d059378d4d638e5d3fea2ba917007a010eaa079a336d275d2a96d8cbf5e8704ad5cd69f595366d3a75549502109a1ff8fbeecf645d1cf8961a16cc10ec10714e6b4ac929897c031b089faa3118b2a215b7b65c12382a9aefdc8d639211dbbe823094bc7b17286615e472021f4afc0cd99679877ed2a6286fbe008fe07bb5baf1c8a6ff918808a269e6a013670517e84ded87ff028bf1633a7c3793cc782ecf5572d60b9e1be62bf8b2741a87478170d01c19afe982e75770", 0xe7, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="6837e4ff4885ebfe", 0x8, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bbff02cc6509f63760ce07f12c2baf577e6f0503c9ca", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x36) ptrace$cont(0x18, r4, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r4, 0x11) [ 424.855520][T27344] __should_failslab+0x81/0x90 [ 424.860296][T27344] ? __se_sys_mount+0xf2/0x2e0 [ 424.865073][T27344] should_failslab+0x5/0x20 [ 424.869637][T27344] kmem_cache_alloc_trace+0x49/0x340 [ 424.874927][T27344] ? _copy_from_user+0x94/0xd0 [ 424.879702][T27344] __se_sys_mount+0xf2/0x2e0 [ 424.884300][T27344] ? mntput+0x45/0x70 [ 424.888299][T27344] ? __fpregs_load_activate+0x103/0x1f0 [ 424.893854][T27344] __x64_sys_mount+0x63/0x70 [ 424.898488][T27344] do_syscall_64+0x39/0x80 01:44:52 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 424.902934][T27344] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 424.908848][T27344] RIP: 0033:0x46797a [ 424.912776][T27344] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 424.932491][T27344] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 424.940962][T27344] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 424.948945][T27344] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 01:44:52 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 424.956931][T27344] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 424.964958][T27344] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 424.973024][T27344] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 425.058098][T27348] loop5: detected capacity change from 0 to 9 [ 425.080984][T27348] MINIX-fs: bad superblock or unable to read bitmaps 01:44:52 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:52 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:52 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {0x0}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:52 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f, 0xbdbee3bc89050d2}}, 0x20) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:52 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 425.183658][T27381] loop1: detected capacity change from 0 to 4 [ 425.196220][T27381] FAULT_INJECTION: forcing a failure. [ 425.196220][T27381] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.260840][T27393] loop5: detected capacity change from 0 to 16 [ 425.274843][T27381] CPU: 0 PID: 27381 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 425.283643][T27381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.295067][T27381] Call Trace: [ 425.298356][T27381] dump_stack+0x137/0x19d [ 425.302704][T27381] should_fail+0x23c/0x250 [ 425.307131][T27381] should_fail_usercopy+0x16/0x20 [ 425.312159][T27381] _copy_from_user+0x1c/0xd0 [ 425.317132][T27381] __se_sys_mount+0x115/0x2e0 [ 425.321818][T27381] ? mntput+0x45/0x70 [ 425.325806][T27381] ? __fpregs_load_activate+0x103/0x1f0 [ 425.331366][T27381] __x64_sys_mount+0x63/0x70 [ 425.336039][T27381] do_syscall_64+0x39/0x80 [ 425.340517][T27381] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 425.346462][T27381] RIP: 0033:0x46797a [ 425.350366][T27381] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 425.370071][T27381] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 425.378500][T27381] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 425.386520][T27381] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 425.394503][T27381] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 425.402662][T27381] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 01:44:53 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:53 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r3}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:53 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {0x0}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 425.410649][T27381] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 425.422981][T27393] MINIX-fs: bad superblock or unable to read bitmaps 01:44:53 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) r3 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r3}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 425.504177][T27381] MINIX-fs: bad superblock or unable to read bitmaps [ 425.514976][T27393] loop5: detected capacity change from 0 to 16 [ 425.526584][T27393] MINIX-fs: bad superblock or unable to read bitmaps 01:44:55 executing program 4: r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:55 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {0x0}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:55 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, r1) r2 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r2}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:55 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:55 executing program 3: r0 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r0, 0x2, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x3f8a8c18c10e287c}, 0x4000010) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000000000000000000000000f58400000018000000950000000000000073ecd46f3968a59c49ac56a72d1d576561a4cb7d5f2fab5bf547dbf783c5dd998d70233c9971c94a91f866f2e602bff93451384d22802a94820213ca49e5849ff774bd57de1b93beabeed07be5beaddd2f225d7c83562d4e9472"], &(0x7f0000000700)='syzkaller\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r6 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='add_device_randomness\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x17, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000060000000c2f08000800000018240000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff9700000000001e009500000004000000"], &(0x7f0000000140)='syzkaller\x00', 0xc51, 0xcf, &(0x7f0000000180)=""/207, 0x40f00, 0x1, [], 0x0, 0x9, r4, 0x8, &(0x7f0000000280)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x0, 0xffffffff}, 0x10, 0xffffffffffffffff, r5}, 0x78) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r7, 0x0, r9, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r7, r8) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r3}}, 0x18) request_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f0000000600)='\x00', r2) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:55 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 427.986270][T27425] loop1: detected capacity change from 0 to 4 [ 427.993779][T27427] loop5: detected capacity change from 0 to 16 [ 428.008403][T27425] FAULT_INJECTION: forcing a failure. [ 428.008403][T27425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 428.026495][T27427] MINIX-fs: bad superblock or unable to read bitmaps [ 428.035616][T27425] CPU: 0 PID: 27425 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 428.044656][T27425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.054715][T27425] Call Trace: [ 428.058023][T27425] dump_stack+0x137/0x19d [ 428.062368][T27425] should_fail+0x23c/0x250 [ 428.066875][T27425] should_fail_usercopy+0x16/0x20 [ 428.071965][T27425] _copy_from_user+0x1c/0xd0 [ 428.076678][T27425] __se_sys_mount+0x115/0x2e0 [ 428.081381][T27425] ? mntput+0x45/0x70 [ 428.085422][T27425] ? __fpregs_load_activate+0x103/0x1f0 [ 428.091033][T27425] __x64_sys_mount+0x63/0x70 [ 428.095628][T27425] do_syscall_64+0x39/0x80 [ 428.100048][T27425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 428.105964][T27425] RIP: 0033:0x46797a [ 428.109860][T27425] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:44:55 executing program 4: r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r1}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:55 executing program 4: r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 428.129755][T27425] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 428.138176][T27425] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 428.146212][T27425] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 428.154193][T27425] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 428.162165][T27425] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 428.170133][T27425] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000000)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:55 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f00000000c0)={&(0x7f0000000000)="5fe389f9a061f6ad0bf08d811aa74e16d3ef24469c39d5c70899e0eca53e3f99f6cede1e64d1a599bf34e1456d1ce07d03bb72b67fa03c75bf42a32598b2234cc02bf935bbb6f0a030c7c8d8913a4b81aac2f54e8bae00d57cd8e108baa817003f244c52c22d261d6bddb679a15a1c2360adf3354f8cdbc7eb488c5f3e0dee8c4380840bfe35be61bd99440e1abf4d70e8eec1e2ebe0dad1a16c15a6d2b2f193482e4a478fc0e5403cdbee403ad9404ed8fbe68fb4d6dfd8dc8931d984756e", 0xbf}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000280)=""/226, 0x18}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 428.231914][T27427] loop5: detected capacity change from 0 to 16 [ 428.238733][T27425] MINIX-fs: bad superblock or unable to read bitmaps [ 428.265687][T27427] MINIX-fs: bad superblock or unable to read bitmaps 01:44:55 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 428.317548][T27452] input: syz1 as /devices/virtual/input/input44 01:44:56 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2500, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:56 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 428.434664][T27466] loop1: detected capacity change from 0 to 4 01:44:56 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 428.481885][T27466] FAULT_INJECTION: forcing a failure. [ 428.481885][T27466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 428.559416][T27477] loop5: detected capacity change from 0 to 18 [ 428.564787][T27466] CPU: 1 PID: 27466 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 428.574407][T27466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.584751][T27466] Call Trace: [ 428.588034][T27466] dump_stack+0x137/0x19d [ 428.592382][T27466] should_fail+0x23c/0x250 [ 428.596804][T27466] should_fail_usercopy+0x16/0x20 [ 428.601838][T27466] strncpy_from_user+0x21/0x250 [ 428.606753][T27466] getname_flags+0xb8/0x3d0 [ 428.611258][T27466] user_path_at_empty+0x28/0x50 [ 428.616110][T27466] __se_sys_mount+0x209/0x2e0 [ 428.620801][T27466] __x64_sys_mount+0x63/0x70 [ 428.625586][T27466] do_syscall_64+0x39/0x80 [ 428.630044][T27466] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 428.635957][T27466] RIP: 0033:0x46797a [ 428.639854][T27466] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 428.661569][T27466] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 428.669990][T27466] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 428.677979][T27466] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 428.686037][T27466] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 428.694022][T27466] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 428.698676][T27477] MINIX-fs: bad superblock or unable to read bitmaps 01:44:56 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:56 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {0x0}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 428.701995][T27466] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:56 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {0x0}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 428.767960][T27477] loop5: detected capacity change from 0 to 18 [ 428.777783][T27477] MINIX-fs: bad superblock or unable to read bitmaps [ 428.898017][T27501] loop1: detected capacity change from 0 to 4 [ 428.922155][T27501] FAULT_INJECTION: forcing a failure. [ 428.922155][T27501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 428.953510][T27501] CPU: 1 PID: 27501 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 428.962368][T27501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.972432][T27501] Call Trace: [ 428.975719][T27501] dump_stack+0x137/0x19d [ 428.980155][T27501] should_fail+0x23c/0x250 [ 428.984581][T27501] should_fail_usercopy+0x16/0x20 [ 428.989620][T27501] strncpy_from_user+0x21/0x250 [ 428.994475][T27501] getname_flags+0xb8/0x3d0 [ 428.999028][T27501] user_path_at_empty+0x28/0x50 [ 429.003926][T27501] __se_sys_mount+0x209/0x2e0 [ 429.008749][T27501] __x64_sys_mount+0x63/0x70 [ 429.013342][T27501] do_syscall_64+0x39/0x80 [ 429.017867][T27501] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 429.023770][T27501] RIP: 0033:0x46797a [ 429.027663][T27501] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 429.047277][T27501] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 429.055715][T27501] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 429.063717][T27501] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 429.071871][T27501] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 429.079852][T27501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 429.087842][T27501] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x1c, 0x0, @ib={0x1b, 0x6, 0x3, {"8e7229df979cfe15227d4339f0c53e65"}, 0x2, 0x7f, 0x9}}}, 0xa0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r2, 0x0, r4, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r2, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r5, r0}}, 0x18) 01:44:56 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:56 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x3703, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:56 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {0x0}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 429.129713][T27506] input: syz1 as /devices/virtual/input/input45 01:44:56 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:56 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:56 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 429.266786][T27526] loop5: detected capacity change from 0 to 27 01:44:56 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 429.355255][T27526] MINIX-fs: bad superblock or unable to read bitmaps 01:44:57 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:57 executing program 3: splice(0xffffffffffffffff, &(0x7f0000000000)=0x1f, 0xffffffffffffffff, &(0x7f0000000040), 0x2, 0xc) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:57 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 429.398044][T27540] loop1: detected capacity change from 0 to 4 [ 429.415162][T27540] FAULT_INJECTION: forcing a failure. [ 429.415162][T27540] name failslab, interval 1, probability 0, space 0, times 0 [ 429.470623][T27540] CPU: 1 PID: 27540 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 429.479521][T27540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.489596][T27540] Call Trace: [ 429.492876][T27540] dump_stack+0x137/0x19d [ 429.497243][T27540] should_fail+0x23c/0x250 [ 429.501686][T27540] __should_failslab+0x81/0x90 [ 429.506460][T27540] ? tomoyo_encode2+0x1d3/0x350 [ 429.511417][T27540] should_failslab+0x5/0x20 [ 429.515933][T27540] __kmalloc+0x66/0x380 [ 429.520193][T27540] ? crypto_shash_update+0x12c/0x190 [ 429.525486][T27540] tomoyo_encode2+0x1d3/0x350 [ 429.530177][T27540] tomoyo_encode+0x25/0x30 [ 429.534679][T27540] tomoyo_mount_permission+0x1d7/0x700 [ 429.540210][T27540] ? filename_lookup+0x2b6/0x380 [ 429.545173][T27540] ? ___cache_free+0x3c/0x2f0 [ 429.549872][T27540] ? terminate_walk+0x24e/0x270 [ 429.554760][T27540] tomoyo_sb_mount+0x31/0x40 [ 429.558103][T27550] loop5: detected capacity change from 0 to 31 [ 429.559627][T27540] security_sb_mount+0x5c/0xb0 [ 429.570533][T27540] path_mount+0xb1/0x1c00 [ 429.574926][T27540] __se_sys_mount+0x23d/0x2e0 [ 429.579686][T27540] __x64_sys_mount+0x63/0x70 [ 429.584295][T27540] do_syscall_64+0x39/0x80 [ 429.588725][T27540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 429.594627][T27540] RIP: 0033:0x46797a [ 429.598690][T27540] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 429.611760][T27550] MINIX-fs: bad superblock or unable to read bitmaps [ 429.618421][T27540] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 429.618446][T27540] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 429.618459][T27540] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 429.618471][T27540] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 429.657938][T27540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 01:44:57 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x0, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:57 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x3, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:57 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x600102, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x140e, 0x8, 0x70bd2b, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x2f06e147087e57e2) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) 01:44:57 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ab}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 429.665995][T27540] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 429.737567][T27550] loop5: detected capacity change from 0 to 31 [ 429.753343][T27550] MINIX-fs: bad superblock or unable to read bitmaps 01:44:57 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:57 executing program 2: r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='encrypted\x00', 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) 01:44:57 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x0, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:57 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:57 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:57 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:57 executing program 2: r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 429.947731][T27586] loop5: detected capacity change from 0 to 32 [ 429.960931][T27589] loop1: detected capacity change from 0 to 4 [ 429.981506][T27586] MINIX-fs: bad superblock or unable to read bitmaps 01:44:57 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x0, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010101}}}, 0x90) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x13f, 0x1}}, 0x20) [ 430.003616][T27589] FAULT_INJECTION: forcing a failure. [ 430.003616][T27589] name failslab, interval 1, probability 0, space 0, times 0 [ 430.063897][T27589] CPU: 1 PID: 27589 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 430.072717][T27589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.082829][T27589] Call Trace: [ 430.086147][T27589] dump_stack+0x137/0x19d [ 430.090485][T27589] should_fail+0x23c/0x250 [ 430.094913][T27589] __should_failslab+0x81/0x90 [ 430.099824][T27589] ? tomoyo_encode2+0x1d3/0x350 [ 430.104684][T27589] should_failslab+0x5/0x20 [ 430.109191][T27589] __kmalloc+0x66/0x380 [ 430.113348][T27589] tomoyo_encode2+0x1d3/0x350 [ 430.118088][T27589] tomoyo_realpath_from_path+0x35e/0x3b0 [ 430.123798][T27589] tomoyo_mount_permission+0x215/0x700 [ 430.129262][T27589] ? filename_lookup+0x2b6/0x380 [ 430.134236][T27589] ? ___cache_free+0x3c/0x2f0 [ 430.138961][T27589] tomoyo_sb_mount+0x31/0x40 [ 430.143559][T27589] security_sb_mount+0x5c/0xb0 [ 430.148322][T27589] path_mount+0xb1/0x1c00 [ 430.152768][T27589] __se_sys_mount+0x23d/0x2e0 [ 430.157442][T27589] __x64_sys_mount+0x63/0x70 [ 430.162100][T27589] do_syscall_64+0x39/0x80 [ 430.166514][T27589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 430.172424][T27589] RIP: 0033:0x46797a [ 430.176461][T27589] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 430.196066][T27589] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 430.204501][T27589] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a 01:44:57 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, 0x0, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:57 executing program 2: r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 430.212475][T27589] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 430.220450][T27589] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 430.228427][T27589] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 430.236404][T27589] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:58 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:58 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, 0x0, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:58 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:58 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 430.311338][T27589] ERROR: Out of memory at tomoyo_realpath_from_path. [ 430.319783][T27586] loop5: detected capacity change from 0 to 32 [ 430.336835][T27586] MINIX-fs: bad superblock or unable to read bitmaps 01:44:58 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:58 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:58 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x0, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:58 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, 0x0, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 430.476758][T27633] loop1: detected capacity change from 0 to 4 01:44:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="1857bf1f75d8bf3bffe56c", 0xb, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) [ 430.532857][T27633] FAULT_INJECTION: forcing a failure. [ 430.532857][T27633] name failslab, interval 1, probability 0, space 0, times 0 [ 430.557261][T27638] loop5: detected capacity change from 0 to 36 [ 430.605779][T27638] MINIX-fs: bad superblock or unable to read bitmaps [ 430.652655][T27633] CPU: 0 PID: 27633 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 430.661546][T27633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.671603][T27633] Call Trace: [ 430.674883][T27633] dump_stack+0x137/0x19d [ 430.679216][T27633] should_fail+0x23c/0x250 [ 430.683720][T27633] __should_failslab+0x81/0x90 [ 430.688582][T27633] ? tomoyo_encode2+0x1d3/0x350 [ 430.693452][T27633] should_failslab+0x5/0x20 [ 430.698044][T27633] __kmalloc+0x66/0x380 [ 430.702198][T27633] tomoyo_encode2+0x1d3/0x350 [ 430.707030][T27633] tomoyo_realpath_from_path+0x35e/0x3b0 [ 430.712666][T27633] tomoyo_mount_permission+0x215/0x700 [ 430.718127][T27633] ? filename_lookup+0x2b6/0x380 [ 430.723112][T27633] ? ___cache_free+0x3c/0x2f0 [ 430.727790][T27633] tomoyo_sb_mount+0x31/0x40 [ 430.732391][T27633] security_sb_mount+0x5c/0xb0 [ 430.737273][T27633] path_mount+0xb1/0x1c00 [ 430.741697][T27633] __se_sys_mount+0x23d/0x2e0 [ 430.746677][T27633] __x64_sys_mount+0x63/0x70 [ 430.751317][T27633] do_syscall_64+0x39/0x80 [ 430.755802][T27633] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 430.761702][T27633] RIP: 0033:0x46797a [ 430.765588][T27633] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 430.785210][T27633] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 430.793642][T27633] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a 01:44:58 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x0, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 430.801616][T27633] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 430.809591][T27633] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 430.817565][T27633] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 430.825539][T27633] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:58 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x0, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 430.885909][T27633] ERROR: Out of memory at tomoyo_realpath_from_path. 01:44:58 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:58 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:58 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x0, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:58 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001680)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001240)=ANY=[@ANYBLOB='$\x00\x00\x00)\x00\'\r\x00'/20, @ANYRES32=r1, @ANYBLOB="f2ff0000f06f8aa300000000"], 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000700)={'ip6gre0\x00', &(0x7f0000000680)={'syztnl1\x00', 0x0, 0x29, 0x9c, 0x1f, 0x80000000, 0x50, @local, @remote, 0x7800, 0x8, 0x33fb, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000800)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000680001000000000000000008020000000400000006000740050000000c000880080004000000008008000500", @ANYRES32=r6, @ANYBLOB="080006"], 0x3c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x101c80a8}, 0xc, &(0x7f0000000840)={&(0x7f0000000d00)={0x40c, 0x0, 0x0, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5c3}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r1}, {0x26c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x80, 0x4, 0x9, 0x8}, {0x4, 0xb2, 0x2, 0x40}, {0x7, 0x81, 0xa9, 0xfffffff8}, {0xff, 0x0, 0x7, 0x6}, {0x2, 0xff, 0x20, 0x8}, {0x80, 0x3, 0x7f, 0x3f}, {0x2bc, 0xff, 0x6, 0x5}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r2}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x101, 0x0, 0x8a, 0x1}, {0x20, 0x9, 0xb9, 0x4d000000}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x40c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4084) r7 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) dup2(r0, r7) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r8, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r8, 0x40049421, 0x2) 01:44:58 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x0, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 431.037561][T27669] loop1: detected capacity change from 0 to 4 [ 431.094209][T27669] FAULT_INJECTION: forcing a failure. [ 431.094209][T27669] name failslab, interval 1, probability 0, space 0, times 0 [ 431.151563][T27669] CPU: 1 PID: 27669 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 431.160436][T27669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.170493][T27669] Call Trace: [ 431.173773][T27669] dump_stack+0x137/0x19d [ 431.178136][T27669] should_fail+0x23c/0x250 [ 431.182560][T27669] __should_failslab+0x81/0x90 [ 431.187321][T27669] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 431.193148][T27669] should_failslab+0x5/0x20 [ 431.197667][T27669] __kmalloc+0x66/0x380 [ 431.201821][T27669] ? getname_kernel+0x37/0x1d0 [ 431.206614][T27669] tomoyo_realpath_from_path+0x98/0x3b0 [ 431.212176][T27669] tomoyo_mount_permission+0x639/0x700 [ 431.217646][T27669] ? ___cache_free+0x3c/0x2f0 [ 431.222329][T27669] tomoyo_sb_mount+0x31/0x40 [ 431.226940][T27669] security_sb_mount+0x5c/0xb0 [ 431.231705][T27669] path_mount+0xb1/0x1c00 [ 431.236033][T27669] __se_sys_mount+0x23d/0x2e0 [ 431.240719][T27669] __x64_sys_mount+0x63/0x70 [ 431.245316][T27669] do_syscall_64+0x39/0x80 [ 431.249846][T27669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 431.255825][T27669] RIP: 0033:0x46797a [ 431.259713][T27669] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 431.279320][T27669] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 431.287769][T27669] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 431.295741][T27669] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 431.303714][T27669] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 431.311688][T27669] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 431.319679][T27669] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:59 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x0, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xed9e}, {0xa, 0x4e24, 0x2, @loopback, 0x5}, r1, 0x8001}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380), 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000600)={0x8, 0x120, 0xfa00, {0x0, {0x6, 0x692, "f3acac8b29dfb64edb7b0506ef321066359567e7e4b25b4757d0a83b00c31b747cd1409d17c1eef199c4a03c870ea69f877cafb8125afe27dee0d1319617b55b38de0dd1a390f3a97e17c6e52edffd0e00c5402427b2d1c97da5023046c847df88ac6953356188eb6dd910bf127e3eef2944dbf57e5af8581c0991548fc8af1602ba1404e4994b34e6da66e8a141233bf78bb09ab39b3a72c451d0135057740a0466e9cb648464f448b05cdfa3ccb8c5d7d591a3f083b94109b74656cd624b9758c62ddcf034b1939c00fa000000000000000000000000000d0000000000000000000000000000000000000000001000", 0x1, 0x40, 0x0, 0x1f, 0x1, 0xb7, 0xca, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 01:44:59 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x0, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:44:59 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, 0x0, &(0x7f0000000240)) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 431.485279][T27690] loop5: detected capacity change from 0 to 38 [ 431.497421][T27690] MINIX-fs: bad superblock or unable to read bitmaps 01:44:59 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x0, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 431.538033][T27669] ERROR: Out of memory at tomoyo_realpath_from_path. 01:44:59 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:59 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x0, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x541568e5]}, 0x8, 0xe2f5392476021a7f) ioctl$FIONCLEX(r0, 0x5450) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000780)='\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40]}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}}}, 0x78) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1030017, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access', 0x3d, r5}}, {@debug={'debug', 0x3d, 0x73a07b26}}, {@dfltgid={'dfltgid', 0x3d, r7}}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) splice(r2, 0x0, r4, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r2, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2, 0x3}}, 0x20) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) r8 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r8, 0xc1105517, &(0x7f0000000bc0)={{0x8, 0x0, 0x0, 0x1, 'syz1\x00', 0x2}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x40, 0x0, 0x0, 0xfffd]}) ioctl(r8, 0x1, &(0x7f0000000180)="fc582c7c860f5d600ee9f8ca5221cfdace6ecc6bbe5a01ddd0a2b0b38d0696b2f7f83ea9bb3c7e5d61bf3e9482cc8cc6ef308b9814451f8a7f5adf51c4") 01:44:59 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x0, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x0, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 431.580269][T27690] loop5: detected capacity change from 0 to 38 [ 431.619605][T27690] MINIX-fs: bad superblock or unable to read bitmaps 01:44:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x5c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:59 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x0, 0x0, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 431.750431][T27717] loop1: detected capacity change from 0 to 4 01:44:59 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 431.813310][T27717] FAULT_INJECTION: forcing a failure. [ 431.813310][T27717] name failslab, interval 1, probability 0, space 0, times 0 [ 431.829663][T27722] loop5: detected capacity change from 0 to 46 [ 431.849322][T27717] CPU: 0 PID: 27717 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 01:44:59 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x0, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) keyctl$search(0xa, r1, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x0}, r1) [ 431.858113][T27717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.868200][T27717] Call Trace: [ 431.871480][T27717] dump_stack+0x137/0x19d [ 431.875823][T27717] should_fail+0x23c/0x250 [ 431.880330][T27717] __should_failslab+0x81/0x90 [ 431.885094][T27717] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 431.890913][T27717] should_failslab+0x5/0x20 [ 431.895427][T27717] __kmalloc+0x66/0x380 [ 431.899583][T27717] ? getname_kernel+0x37/0x1d0 [ 431.904344][T27717] tomoyo_realpath_from_path+0x98/0x3b0 [ 431.909894][T27717] tomoyo_mount_permission+0x639/0x700 [ 431.915450][T27717] ? ___cache_free+0x3c/0x2f0 [ 431.920212][T27717] tomoyo_sb_mount+0x31/0x40 [ 431.924807][T27717] security_sb_mount+0x5c/0xb0 [ 431.929590][T27717] path_mount+0xb1/0x1c00 [ 431.933926][T27717] __se_sys_mount+0x23d/0x2e0 [ 431.938605][T27717] __x64_sys_mount+0x63/0x70 [ 431.943194][T27717] do_syscall_64+0x39/0x80 [ 431.947679][T27717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 431.953717][T27717] RIP: 0033:0x46797a [ 431.957685][T27717] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 431.977322][T27717] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 431.985901][T27717] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 431.993934][T27717] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 432.001905][T27717] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 432.009894][T27717] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 432.018387][T27717] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:44:59 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x0, &(0x7f0000000600)={0x0, 0x624b, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 432.059371][T27722] MINIX-fs: bad superblock or unable to read bitmaps [ 432.098346][T27717] ERROR: Out of memory at tomoyo_realpath_from_path. 01:44:59 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:59 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:44:59 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, 0x0, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) 01:44:59 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 432.261542][T27755] loop5: detected capacity change from 0 to 48 [ 432.281884][T27755] MINIX-fs: bad superblock or unable to read bitmaps 01:44:59 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:44:59 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 432.307504][T27758] loop1: detected capacity change from 0 to 4 01:45:00 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 432.355859][T27758] FAULT_INJECTION: forcing a failure. [ 432.355859][T27758] name failslab, interval 1, probability 0, space 0, times 0 [ 432.371966][T27755] loop5: detected capacity change from 0 to 48 [ 432.380977][T27755] MINIX-fs: bad superblock or unable to read bitmaps [ 432.393388][T27758] CPU: 0 PID: 27758 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 01:45:00 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, 0x0, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 432.402161][T27758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.412301][T27758] Call Trace: [ 432.415589][T27758] dump_stack+0x137/0x19d [ 432.419936][T27758] should_fail+0x23c/0x250 [ 432.424357][T27758] __should_failslab+0x81/0x90 [ 432.429122][T27758] ? alloc_fs_context+0x46/0x500 [ 432.434071][T27758] should_failslab+0x5/0x20 [ 432.438582][T27758] kmem_cache_alloc_trace+0x49/0x340 [ 432.443870][T27758] ? aa_get_newest_label+0x74/0x250 [ 432.449077][T27758] alloc_fs_context+0x46/0x500 01:45:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13d, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) splice(r1, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) dup2(r1, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xcc, @local, 0x7}, {0xa, 0x4e22, 0x81, @mcast2, 0x72}, r4, 0x100}}, 0x48) [ 432.453842][T27758] ? strncmp+0x34/0x70 [ 432.458067][T27758] fs_context_for_mount+0x1d/0x20 [ 432.463187][T27758] path_mount+0xdd8/0x1c00 [ 432.467627][T27758] __se_sys_mount+0x23d/0x2e0 [ 432.472362][T27758] __x64_sys_mount+0x63/0x70 [ 432.476970][T27758] do_syscall_64+0x39/0x80 [ 432.481396][T27758] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 432.487373][T27758] RIP: 0033:0x46797a 01:45:00 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) [ 432.491271][T27758] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.510881][T27758] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 432.519346][T27758] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 432.527324][T27758] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 432.535297][T27758] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 432.543267][T27758] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 01:45:00 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, 0x0, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 432.551306][T27758] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:00 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:00 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:00 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:00 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) 01:45:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x0, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:45:00 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 01:45:00 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) 01:45:00 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 432.801708][T27803] loop5: detected capacity change from 0 to 52 [ 432.826055][T27803] MINIX-fs: bad superblock or unable to read bitmaps [ 432.840597][T27811] loop1: detected capacity change from 0 to 4 01:45:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x0, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:45:00 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), 0x0) 01:45:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x0, 0x8, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 432.895561][T27803] loop5: detected capacity change from 0 to 52 [ 432.921696][T27811] FAULT_INJECTION: forcing a failure. [ 432.921696][T27811] name failslab, interval 1, probability 0, space 0, times 0 [ 432.937588][T27803] MINIX-fs: bad superblock or unable to read bitmaps [ 432.962944][T27811] CPU: 0 PID: 27811 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 432.971747][T27811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.981910][T27811] Call Trace: [ 432.985185][T27811] dump_stack+0x137/0x19d [ 432.989536][T27811] should_fail+0x23c/0x250 [ 432.993960][T27811] __should_failslab+0x81/0x90 [ 432.998822][T27811] ? legacy_init_fs_context+0x2d/0x70 [ 433.004285][T27811] should_failslab+0x5/0x20 [ 433.008792][T27811] kmem_cache_alloc_trace+0x49/0x340 [ 433.014110][T27811] ? kmem_cache_alloc_trace+0x1c6/0x340 [ 433.019718][T27811] ? alloc_fs_context+0x46/0x500 [ 433.024660][T27811] legacy_init_fs_context+0x2d/0x70 [ 433.030056][T27811] alloc_fs_context+0x419/0x500 [ 433.034908][T27811] fs_context_for_mount+0x1d/0x20 [ 433.039963][T27811] path_mount+0xdd8/0x1c00 [ 433.044384][T27811] __se_sys_mount+0x23d/0x2e0 [ 433.049065][T27811] __x64_sys_mount+0x63/0x70 [ 433.053754][T27811] do_syscall_64+0x39/0x80 [ 433.058173][T27811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.064766][T27811] RIP: 0033:0x46797a [ 433.069435][T27811] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 433.089046][T27811] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 433.097463][T27811] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 433.105469][T27811] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 01:45:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x0, 0x2, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 433.113452][T27811] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 433.121426][T27811] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 433.129402][T27811] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:00 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:00 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), 0x0) 01:45:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x3, &(0x7f0000000140)=[@timestamp, @timestamp, @window, @window], 0x4) 01:45:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x0, 0x0, 0x2f6, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:45:00 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:00 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x30, 0xd, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x30}}, 0x0) 01:45:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 433.288030][T27849] loop5: detected capacity change from 0 to 54 [ 433.320373][T27856] loop1: detected capacity change from 0 to 4 01:45:01 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:01 executing program 4: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), 0x0) 01:45:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x19, 0x4) [ 433.354018][T27849] MINIX-fs: bad superblock or unable to read bitmaps 01:45:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) [ 433.396388][T27856] FAULT_INJECTION: forcing a failure. [ 433.396388][T27856] name failslab, interval 1, probability 0, space 0, times 0 [ 433.448182][ T3238] ieee802154 phy0 wpan0: encryption failed: -22 [ 433.454497][ T3238] ieee802154 phy1 wpan1: encryption failed: -22 [ 433.490871][T27856] CPU: 0 PID: 27856 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 433.499696][T27856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.510115][T27856] Call Trace: [ 433.513392][T27856] dump_stack+0x137/0x19d [ 433.517734][T27856] should_fail+0x23c/0x250 [ 433.522213][T27856] __should_failslab+0x81/0x90 [ 433.527084][T27856] ? vfs_parse_fs_string+0x5e/0xc0 [ 433.532409][T27856] should_failslab+0x5/0x20 [ 433.537344][T27856] __kmalloc_track_caller+0x64/0x380 [ 433.542634][T27856] kmemdup_nul+0x27/0x70 [ 433.546912][T27856] vfs_parse_fs_string+0x5e/0xc0 [ 433.552601][T27856] path_mount+0xf7c/0x1c00 [ 433.557194][T27856] __se_sys_mount+0x23d/0x2e0 [ 433.561873][T27856] __x64_sys_mount+0x63/0x70 [ 433.567206][T27856] do_syscall_64+0x39/0x80 [ 433.571680][T27856] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.577757][T27856] RIP: 0033:0x46797a [ 433.582023][T27856] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 433.601668][T27856] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 433.610167][T27856] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 433.618136][T27856] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 433.626193][T27856] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 433.634329][T27856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 433.642468][T27856] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 433.650776][T27849] loop5: detected capacity change from 0 to 54 [ 433.686292][T27849] MINIX-fs: bad superblock or unable to read bitmaps [ 433.695759][T27878] loop4: detected capacity change from 0 to 4096 [ 433.711286][T27878] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:45:01 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x6, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 01:45:01 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:01 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 01:45:01 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) [ 433.868244][T27892] loop5: detected capacity change from 0 to 58 [ 433.893570][T27892] MINIX-fs: bad superblock or unable to read bitmaps [ 433.900820][T27891] loop1: detected capacity change from 0 to 4 01:45:01 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) [ 433.934493][T27891] FAULT_INJECTION: forcing a failure. [ 433.934493][T27891] name failslab, interval 1, probability 0, space 0, times 0 [ 433.957425][T27891] CPU: 1 PID: 27891 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 433.966341][T27891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.976401][T27891] Call Trace: [ 433.979687][T27891] dump_stack+0x137/0x19d [ 433.984109][T27891] should_fail+0x23c/0x250 [ 433.988532][T27891] ? minix_mount+0x40/0x40 [ 433.992952][T27891] ? getname_kernel+0x37/0x1d0 [ 433.997730][T27891] __should_failslab+0x81/0x90 [ 434.002496][T27891] should_failslab+0x5/0x20 [ 434.007026][T27891] kmem_cache_alloc+0x46/0x320 [ 434.011843][T27891] ? minix_mount+0x40/0x40 [ 434.016264][T27891] getname_kernel+0x37/0x1d0 [ 434.020853][T27891] ? minix_mount+0x40/0x40 [ 434.025273][T27891] kern_path+0x19/0x40 [ 434.029343][T27891] blkdev_get_by_path+0x54/0x1b0 [ 434.034312][T27891] mount_bdev+0x47/0x290 [ 434.038590][T27891] ? aa_get_newest_label+0x74/0x250 [ 434.043808][T27891] ? minix_bmap+0x30/0x30 [ 434.048145][T27891] minix_mount+0x2d/0x40 [ 434.052391][T27891] legacy_get_tree+0x70/0xc0 [ 434.057115][T27891] vfs_get_tree+0x4a/0x1a0 [ 434.061540][T27891] path_mount+0x11b9/0x1c00 [ 434.066046][T27891] __se_sys_mount+0x23d/0x2e0 [ 434.070826][T27891] __x64_sys_mount+0x63/0x70 [ 434.075420][T27891] do_syscall_64+0x39/0x80 [ 434.079846][T27891] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.085778][T27891] RIP: 0033:0x46797a [ 434.089671][T27891] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.109375][T27891] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 434.117881][T27891] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 434.125861][T27891] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 01:45:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) 01:45:01 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 434.133917][T27891] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 434.142159][T27891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 434.150739][T27891] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 434.202540][T27892] loop5: detected capacity change from 0 to 58 [ 434.246069][T27892] MINIX-fs: bad superblock or unable to read bitmaps 01:45:01 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) 01:45:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:02 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 434.410450][T27917] loop3: detected capacity change from 0 to 4096 [ 434.450191][T27917] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 434.468763][T27928] loop4: detected capacity change from 0 to 4096 01:45:02 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:02 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) [ 434.541753][T27928] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 434.612108][T27942] loop1: detected capacity change from 0 to 4 [ 434.623276][T27942] FAULT_INJECTION: forcing a failure. [ 434.623276][T27942] name failslab, interval 1, probability 0, space 0, times 0 [ 434.648021][T27942] CPU: 1 PID: 27942 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 434.650188][T27940] loop5: detected capacity change from 0 to 61 [ 434.656823][T27942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.656838][T27942] Call Trace: [ 434.656847][T27942] dump_stack+0x137/0x19d [ 434.680638][T27942] should_fail+0x23c/0x250 [ 434.685073][T27942] ? minix_mount+0x40/0x40 [ 434.689560][T27942] ? getname_kernel+0x37/0x1d0 [ 434.694417][T27942] __should_failslab+0x81/0x90 [ 434.699203][T27942] should_failslab+0x5/0x20 [ 434.703716][T27942] kmem_cache_alloc+0x46/0x320 [ 434.708569][T27942] ? minix_mount+0x40/0x40 [ 434.712991][T27942] getname_kernel+0x37/0x1d0 [ 434.717630][T27942] ? minix_mount+0x40/0x40 [ 434.722055][T27942] kern_path+0x19/0x40 [ 434.726138][T27942] blkdev_get_by_path+0x54/0x1b0 [ 434.731340][T27942] mount_bdev+0x47/0x290 [ 434.735584][T27942] ? aa_get_newest_label+0x74/0x250 [ 434.740818][T27942] ? minix_bmap+0x30/0x30 [ 434.745213][T27942] minix_mount+0x2d/0x40 [ 434.749519][T27942] legacy_get_tree+0x70/0xc0 [ 434.754287][T27942] vfs_get_tree+0x4a/0x1a0 [ 434.758748][T27942] path_mount+0x11b9/0x1c00 [ 434.761401][T27940] MINIX-fs: bad superblock or unable to read bitmaps [ 434.763283][T27942] __se_sys_mount+0x23d/0x2e0 [ 434.763379][T27942] __x64_sys_mount+0x63/0x70 [ 434.779298][T27942] do_syscall_64+0x39/0x80 [ 434.783828][T27942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.789767][T27942] RIP: 0033:0x46797a 01:45:02 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), 0x0) 01:45:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) 01:45:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) 01:45:02 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 434.793656][T27942] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.813260][T27942] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 434.821742][T27942] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 434.829739][T27942] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 434.837711][T27942] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 434.845681][T27942] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 434.853651][T27942] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:02 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:02 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 434.935040][T27940] loop5: detected capacity change from 0 to 61 [ 434.972915][T27940] MINIX-fs: bad superblock or unable to read bitmaps [ 434.999713][T27965] loop4: detected capacity change from 0 to 4096 [ 435.013994][T27965] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:45:02 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), 0x0) 01:45:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xc800, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 435.084636][T27972] loop3: detected capacity change from 0 to 4096 01:45:02 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:02 executing program 2: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x361, &(0x7f0000000600)={0x0, 0x624b}, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000680), 0x0) 01:45:02 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 435.149728][T27979] loop5: detected capacity change from 0 to 100 [ 435.177583][T27972] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 435.203441][T27979] MINIX-fs: bad superblock or unable to read bitmaps 01:45:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) 01:45:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) 01:45:02 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xd113, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 435.361752][T27993] loop1: detected capacity change from 0 to 4 [ 435.411680][T27993] FAULT_INJECTION: forcing a failure. [ 435.411680][T27993] name failslab, interval 1, probability 0, space 0, times 0 [ 435.452506][T28001] loop2: detected capacity change from 0 to 4096 [ 435.461253][T28003] loop4: detected capacity change from 0 to 4096 [ 435.470993][T28004] loop5: detected capacity change from 0 to 104 [ 435.479210][T27993] CPU: 1 PID: 27993 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 435.487996][T27993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.498145][T27993] Call Trace: [ 435.501609][T27993] dump_stack+0x137/0x19d [ 435.505949][T27993] should_fail+0x23c/0x250 [ 435.510586][T27993] __should_failslab+0x81/0x90 [ 435.515369][T27993] ? alloc_super+0x3a/0x520 [ 435.519876][T27993] should_failslab+0x5/0x20 [ 435.524466][T27993] kmem_cache_alloc_trace+0x49/0x340 [ 435.529758][T27993] ? disk_block_events+0x94/0xd0 [ 435.534763][T27993] ? mount_bdev+0x290/0x290 [ 435.539338][T27993] alloc_super+0x3a/0x520 [ 435.543669][T27993] ? mount_bdev+0x290/0x290 [ 435.548181][T27993] sget+0x189/0x370 [ 435.552012][T27993] ? test_bdev_super+0x30/0x30 [ 435.556839][T27993] mount_bdev+0xd3/0x290 [ 435.561087][T27993] ? minix_mount+0x40/0x40 [ 435.565540][T27993] ? minix_bmap+0x30/0x30 [ 435.568797][T28001] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 435.569892][T27993] minix_mount+0x2d/0x40 [ 435.585055][T27993] legacy_get_tree+0x70/0xc0 [ 435.589657][T27993] vfs_get_tree+0x4a/0x1a0 [ 435.594099][T27993] path_mount+0x11b9/0x1c00 [ 435.598661][T27993] __se_sys_mount+0x23d/0x2e0 [ 435.603441][T27993] __x64_sys_mount+0x63/0x70 [ 435.608498][T27993] do_syscall_64+0x39/0x80 [ 435.612996][T27993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 435.618893][T27993] RIP: 0033:0x46797a [ 435.622790][T27993] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 435.625638][T28004] MINIX-fs: bad superblock or unable to read bitmaps [ 435.642497][T27993] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 435.642521][T27993] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 435.642534][T27993] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 435.673644][T27993] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 435.681613][T27993] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 435.689727][T27993] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) 01:45:03 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:03 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 435.702070][T28003] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:45:03 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 435.845866][T28004] loop5: detected capacity change from 0 to 104 [ 435.880134][T28004] MINIX-fs: bad superblock or unable to read bitmaps 01:45:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) [ 435.914409][T28024] loop1: detected capacity change from 0 to 4 01:45:03 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 435.933701][T28024] FAULT_INJECTION: forcing a failure. [ 435.933701][T28024] name failslab, interval 1, probability 0, space 0, times 0 [ 436.004481][T28024] CPU: 1 PID: 28024 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 436.013306][T28024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.023392][T28024] Call Trace: [ 436.026667][T28024] dump_stack+0x137/0x19d [ 436.031005][T28024] should_fail+0x23c/0x250 [ 436.035427][T28024] __should_failslab+0x81/0x90 [ 436.040198][T28024] ? __list_lru_init+0x70/0x520 [ 436.045070][T28024] should_failslab+0x5/0x20 [ 436.049581][T28024] __kmalloc+0x66/0x380 [ 436.053762][T28024] __list_lru_init+0x70/0x520 [ 436.058449][T28024] alloc_super+0x490/0x520 [ 436.062941][T28024] ? mount_bdev+0x290/0x290 [ 436.067449][T28024] sget+0x189/0x370 [ 436.071258][T28024] ? test_bdev_super+0x30/0x30 [ 436.076037][T28024] mount_bdev+0xd3/0x290 [ 436.080277][T28024] ? minix_mount+0x40/0x40 [ 436.084815][T28024] ? minix_bmap+0x30/0x30 [ 436.089154][T28024] minix_mount+0x2d/0x40 [ 436.093396][T28024] legacy_get_tree+0x70/0xc0 [ 436.098058][T28024] vfs_get_tree+0x4a/0x1a0 [ 436.102541][T28024] path_mount+0x11b9/0x1c00 [ 436.107103][T28024] __se_sys_mount+0x23d/0x2e0 [ 436.111778][T28024] __x64_sys_mount+0x63/0x70 [ 436.116383][T28024] do_syscall_64+0x39/0x80 [ 436.120818][T28024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 436.126748][T28024] RIP: 0033:0x46797a [ 436.130636][T28024] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:45:03 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) io_cancel(0x0, 0x0, 0x0) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) lstat(0x0, 0x0) [ 436.150313][T28024] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.158725][T28024] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 436.166728][T28024] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 436.174700][T28024] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 436.182670][T28024] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 436.190677][T28024] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 436.233210][T28030] loop3: detected capacity change from 0 to 4096 [ 436.263900][T28042] loop2: detected capacity change from 0 to 4096 [ 436.275856][T28030] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 436.278793][T28042] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:45:04 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:04 executing program 3: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x3000) munmap(&(0x7f0000fee000/0x12000)=nil, 0x12000) [ 436.324082][T28046] loop5: detected capacity change from 0 to 118 01:45:04 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) [ 436.433434][T28046] MINIX-fs: bad superblock or unable to read bitmaps 01:45:04 executing program 3: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/189) [ 436.546790][T28046] loop5: detected capacity change from 0 to 118 [ 436.560672][T28060] loop1: detected capacity change from 0 to 4 [ 436.587933][T28046] MINIX-fs: bad superblock or unable to read bitmaps [ 436.608604][T28060] FAULT_INJECTION: forcing a failure. [ 436.608604][T28060] name failslab, interval 1, probability 0, space 0, times 0 [ 436.621396][T28060] CPU: 0 PID: 28060 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 436.630165][T28060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.640220][T28060] Call Trace: [ 436.643500][T28060] dump_stack+0x137/0x19d [ 436.647839][T28060] should_fail+0x23c/0x250 [ 436.652361][T28060] __should_failslab+0x81/0x90 [ 436.657191][T28060] should_failslab+0x5/0x20 [ 436.661736][T28060] kmem_cache_alloc_node_trace+0x5b/0x310 [ 436.667504][T28060] ? __kmalloc_node+0x30/0x40 [ 436.672246][T28060] __kmalloc_node+0x30/0x40 [ 436.676780][T28060] kvmalloc_node+0x81/0xf0 [ 436.681206][T28060] __list_lru_init+0x1dd/0x520 01:45:04 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 436.686032][T28060] alloc_super+0x490/0x520 [ 436.690510][T28060] ? mount_bdev+0x290/0x290 [ 436.695019][T28060] sget+0x189/0x370 [ 436.698956][T28060] ? test_bdev_super+0x30/0x30 [ 436.703724][T28060] mount_bdev+0xd3/0x290 [ 436.708057][T28060] ? minix_mount+0x40/0x40 [ 436.712574][T28060] ? minix_bmap+0x30/0x30 [ 436.716931][T28060] minix_mount+0x2d/0x40 [ 436.721261][T28060] legacy_get_tree+0x70/0xc0 [ 436.725852][T28060] vfs_get_tree+0x4a/0x1a0 [ 436.730271][T28060] path_mount+0x11b9/0x1c00 01:45:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000640)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) [ 436.734811][T28060] __se_sys_mount+0x23d/0x2e0 [ 436.739491][T28060] __x64_sys_mount+0x63/0x70 [ 436.744107][T28060] do_syscall_64+0x39/0x80 [ 436.748569][T28060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 436.754525][T28060] RIP: 0033:0x46797a [ 436.758415][T28060] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 436.778024][T28060] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.787200][T28060] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 436.795173][T28060] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 436.803237][T28060] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 436.811230][T28060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 436.819278][T28060] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) io_cancel(0x0, 0x0, 0x0) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) lstat(0x0, 0x0) 01:45:04 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:04 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 436.839047][T28073] loop2: detected capacity change from 0 to 4096 [ 436.903563][T28073] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:45:04 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r6}, 0x10) 01:45:04 executing program 2: r0 = msgget(0x2, 0x0) msgsnd(r0, &(0x7f0000000300), 0x8, 0x800) [ 437.023141][T28094] loop5: detected capacity change from 0 to 127 01:45:04 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0x0, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 437.067578][T28094] MINIX-fs: bad superblock or unable to read bitmaps [ 437.143302][T28094] loop5: detected capacity change from 0 to 127 [ 437.149727][T28108] loop1: detected capacity change from 0 to 4 [ 437.181972][T28094] MINIX-fs: bad superblock or unable to read bitmaps 01:45:04 executing program 3: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5) 01:45:04 executing program 2: socketpair(0x29, 0x2, 0x3, &(0x7f0000000080)) [ 437.202565][T28108] FAULT_INJECTION: forcing a failure. [ 437.202565][T28108] name failslab, interval 1, probability 0, space 0, times 0 [ 437.302799][T28108] CPU: 0 PID: 28108 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 437.311624][T28108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.321762][T28108] Call Trace: [ 437.325038][T28108] dump_stack+0x137/0x19d [ 437.329373][T28108] should_fail+0x23c/0x250 [ 437.333793][T28108] __should_failslab+0x81/0x90 [ 437.338602][T28108] should_failslab+0x5/0x20 [ 437.343109][T28108] kmem_cache_alloc_node_trace+0x5b/0x310 [ 437.348918][T28108] ? __kmalloc_node+0x30/0x40 [ 437.353683][T28108] __kmalloc_node+0x30/0x40 [ 437.358270][T28108] kvmalloc_node+0x81/0xf0 [ 437.362707][T28108] __list_lru_init+0x1dd/0x520 [ 437.367469][T28108] alloc_super+0x490/0x520 [ 437.371905][T28108] ? mount_bdev+0x290/0x290 [ 437.376435][T28108] sget+0x189/0x370 [ 437.380265][T28108] ? test_bdev_super+0x30/0x30 [ 437.385026][T28108] mount_bdev+0xd3/0x290 [ 437.389265][T28108] ? minix_mount+0x40/0x40 [ 437.393750][T28108] ? minix_bmap+0x30/0x30 [ 437.398075][T28108] minix_mount+0x2d/0x40 [ 437.402330][T28108] legacy_get_tree+0x70/0xc0 [ 437.406920][T28108] vfs_get_tree+0x4a/0x1a0 [ 437.411388][T28108] path_mount+0x11b9/0x1c00 [ 437.415890][T28108] __se_sys_mount+0x23d/0x2e0 [ 437.420562][T28108] __x64_sys_mount+0x63/0x70 [ 437.425163][T28108] do_syscall_64+0x39/0x80 [ 437.429609][T28108] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 437.435538][T28108] RIP: 0033:0x46797a [ 437.439469][T28108] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 437.459073][T28108] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 437.467486][T28108] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 437.475470][T28108] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 437.483436][T28108] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 437.491444][T28108] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 01:45:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xff00, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) [ 437.499411][T28108] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:05 executing program 2: openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 01:45:05 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0x0, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) io_cancel(0x0, 0x0, 0x0) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) lstat(0x0, 0x0) 01:45:05 executing program 3: setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0xfffffffffffffccd) 01:45:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[], 0x14c}, 0x0) [ 437.676400][T28139] loop5: detected capacity change from 0 to 127 [ 437.745738][T28139] MINIX-fs: bad superblock or unable to read bitmaps 01:45:05 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:05 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0x0, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001340)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x66c5}, 0x1c, 0x0}, 0x0) 01:45:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xaf, 0x0, 0x8001}, 0x40) [ 437.851864][T28139] loop5: detected capacity change from 0 to 127 01:45:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) io_cancel(0x0, 0x0, 0x0) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)) lstat(0x0, 0x0) [ 437.913738][T28139] MINIX-fs: bad superblock or unable to read bitmaps 01:45:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x5}, 0x40) [ 437.984608][T28163] loop1: detected capacity change from 0 to 4 [ 438.011578][T28163] FAULT_INJECTION: forcing a failure. [ 438.011578][T28163] name failslab, interval 1, probability 0, space 0, times 0 [ 438.057257][T28163] CPU: 1 PID: 28163 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 438.066057][T28163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.076122][T28163] Call Trace: [ 438.079396][T28163] dump_stack+0x137/0x19d [ 438.083765][T28163] should_fail+0x23c/0x250 [ 438.088197][T28163] __should_failslab+0x81/0x90 [ 438.093280][T28163] ? __list_lru_init+0x70/0x520 [ 438.098137][T28163] should_failslab+0x5/0x20 [ 438.102734][T28163] __kmalloc+0x66/0x380 [ 438.106896][T28163] __list_lru_init+0x70/0x520 [ 438.111581][T28163] alloc_super+0x4bf/0x520 [ 438.116027][T28163] ? mount_bdev+0x290/0x290 [ 438.120528][T28163] sget+0x189/0x370 [ 438.124475][T28163] ? test_bdev_super+0x30/0x30 [ 438.129282][T28163] mount_bdev+0xd3/0x290 [ 438.133521][T28163] ? minix_mount+0x40/0x40 [ 438.137935][T28163] ? minix_bmap+0x30/0x30 [ 438.142260][T28163] minix_mount+0x2d/0x40 [ 438.146524][T28163] legacy_get_tree+0x70/0xc0 [ 438.151191][T28163] vfs_get_tree+0x4a/0x1a0 [ 438.155622][T28163] path_mount+0x11b9/0x1c00 [ 438.160121][T28163] __se_sys_mount+0x23d/0x2e0 [ 438.164796][T28163] __x64_sys_mount+0x63/0x70 [ 438.169384][T28163] do_syscall_64+0x39/0x80 [ 438.173803][T28163] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 438.179790][T28163] RIP: 0033:0x46797a [ 438.183676][T28163] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:45:05 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:05 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:05 executing program 2: bpf$BPF_PROG_DETACH(0x1e, &(0x7f0000000040), 0x10) 01:45:05 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) recvmsg$kcm(r3, &(0x7f0000010840)={&(0x7f0000010300)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa08a, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x22, &(0x7f0000000240)=""/34, 0x40f00, 0x4, [], r4, 0x9, r2, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x6, 0x4}, 0x10, 0x0, r5}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x5, 0x9, 0x80, 0x832, 0xffffffffffffffff, 0x2, [], r4, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x40) [ 438.203418][T28163] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.211834][T28163] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 438.219804][T28163] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 438.227774][T28163] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 438.235946][T28163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 438.244041][T28163] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:05 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:05 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:06 executing program 2: bpf$BPF_PROG_DETACH(0x1e, &(0x7f0000000040), 0x10) 01:45:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef6a80277bec00123d0001000d000800bdad446b9bbc7a46e3988285dcdf12f213d3f868fece14955f947ee2b49e33538afa8af92347510f0b56a20ff27fff70fdd02f0fa5", 0x89}], 0x1}, 0x0) 01:45:06 executing program 2: bpf$BPF_PROG_DETACH(0x1e, &(0x7f0000000040), 0x10) [ 438.415876][T28185] loop1: detected capacity change from 0 to 4 01:45:06 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 438.479900][T28185] FAULT_INJECTION: forcing a failure. [ 438.479900][T28185] name failslab, interval 1, probability 0, space 0, times 0 [ 438.496072][T28191] loop5: detected capacity change from 0 to 127 [ 438.531541][T28191] MINIX-fs: bad superblock or unable to read bitmaps [ 438.541034][T28185] CPU: 1 PID: 28185 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 438.549814][T28185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.560490][T28185] Call Trace: [ 438.563771][T28185] dump_stack+0x137/0x19d [ 438.568168][T28185] should_fail+0x23c/0x250 [ 438.572695][T28185] __should_failslab+0x81/0x90 [ 438.577497][T28185] ? __list_lru_init+0x70/0x520 [ 438.582393][T28185] should_failslab+0x5/0x20 [ 438.586930][T28185] __kmalloc+0x66/0x380 [ 438.591207][T28185] __list_lru_init+0x70/0x520 [ 438.595996][T28185] alloc_super+0x4bf/0x520 [ 438.600413][T28185] ? mount_bdev+0x290/0x290 [ 438.604942][T28185] sget+0x189/0x370 [ 438.608753][T28185] ? test_bdev_super+0x30/0x30 [ 438.613528][T28185] mount_bdev+0xd3/0x290 [ 438.617777][T28185] ? minix_mount+0x40/0x40 [ 438.622200][T28185] ? minix_bmap+0x30/0x30 [ 438.626569][T28185] minix_mount+0x2d/0x40 01:45:06 executing program 2: bpf$BPF_PROG_DETACH(0x1e, &(0x7f0000000040), 0x10) [ 438.631011][T28185] legacy_get_tree+0x70/0xc0 [ 438.635605][T28185] vfs_get_tree+0x4a/0x1a0 [ 438.640028][T28185] path_mount+0x11b9/0x1c00 [ 438.644530][T28185] __se_sys_mount+0x23d/0x2e0 [ 438.649208][T28185] __x64_sys_mount+0x63/0x70 [ 438.653801][T28185] do_syscall_64+0x39/0x80 [ 438.658317][T28185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 438.664219][T28185] RIP: 0033:0x46797a [ 438.668159][T28185] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 438.687780][T28185] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.696465][T28185] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 438.704460][T28185] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 438.712481][T28185] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 438.720452][T28185] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 01:45:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 438.728468][T28185] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 438.768307][T28191] loop5: detected capacity change from 0 to 127 [ 438.794436][T28191] MINIX-fs: bad superblock or unable to read bitmaps 01:45:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:06 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00'}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:06 executing program 2: bpf$BPF_PROG_DETACH(0x1e, 0x0, 0x0) [ 439.002591][T28220] loop5: detected capacity change from 0 to 127 [ 439.035441][T28220] MINIX-fs: bad superblock or unable to read bitmaps [ 439.094020][T28220] loop5: detected capacity change from 0 to 127 [ 439.109309][T28220] MINIX-fs: bad superblock or unable to read bitmaps 01:45:06 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) recvmsg$kcm(r3, &(0x7f0000010840)={&(0x7f0000010300)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa08a, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x22, &(0x7f0000000240)=""/34, 0x40f00, 0x4, [], r4, 0x9, r2, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x6, 0x4}, 0x10, 0x0, r5}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x5, 0x9, 0x80, 0x832, 0xffffffffffffffff, 0x2, [], r4, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x40) 01:45:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="140000002900055b335a80648c63940d0624fcc0", 0x14}], 0x1}, 0x0) 01:45:06 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:06 executing program 2: bpf$BPF_PROG_DETACH(0x1e, 0x0, 0x0) 01:45:06 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00'}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:06 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:07 executing program 2: bpf$BPF_PROG_DETACH(0x1e, 0x0, 0x0) [ 439.402901][T28242] loop5: detected capacity change from 0 to 256 [ 439.423904][T28245] loop1: detected capacity change from 0 to 4 01:45:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) recvmsg$kcm(r3, &(0x7f0000010840)={&(0x7f0000010300)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa08a, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x22, &(0x7f0000000240)=""/34, 0x40f00, 0x4, [], r4, 0x9, r2, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x6, 0x4}, 0x10, 0x0, r5}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x5, 0x9, 0x80, 0x832, 0xffffffffffffffff, 0x2, [], r4, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x40) 01:45:07 executing program 2: syz_open_procfs(0x0, 0x0) setresuid(0xee01, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='nl80211\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5], 0x0, 0x0, 0xffffffffffffffff, 0x14, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) syz_mount_image$msdos(0x0, &(0x7f00000015c0)='./bus\x00', 0x0, 0x4, &(0x7f00000059c0)=[{&(0x7f0000001600)}, {&(0x7f0000005b00)}, {0x0}, {0x0, 0x0, 0x4}], 0x0, &(0x7f00000047c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) [ 439.464007][T28245] FAULT_INJECTION: forcing a failure. [ 439.464007][T28245] name failslab, interval 1, probability 0, space 0, times 0 01:45:07 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00'}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 439.509419][T28242] MINIX-fs: bad superblock or unable to read bitmaps [ 439.547326][T28245] CPU: 0 PID: 28245 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 439.556156][T28245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.566660][T28245] Call Trace: [ 439.570569][T28245] dump_stack+0x137/0x19d [ 439.574933][T28245] should_fail+0x23c/0x250 [ 439.579357][T28245] __should_failslab+0x81/0x90 [ 439.584203][T28245] should_failslab+0x5/0x20 [ 439.589070][T28245] kmem_cache_alloc_node_trace+0x5b/0x310 [ 439.594808][T28245] ? __kmalloc_node+0x30/0x40 [ 439.599509][T28245] __kmalloc_node+0x30/0x40 [ 439.604015][T28245] kvmalloc_node+0x81/0xf0 [ 439.608439][T28245] __list_lru_init+0x1dd/0x520 [ 439.613213][T28245] alloc_super+0x4bf/0x520 [ 439.617640][T28245] ? mount_bdev+0x290/0x290 [ 439.622146][T28245] sget+0x189/0x370 [ 439.626043][T28245] ? test_bdev_super+0x30/0x30 [ 439.630878][T28245] mount_bdev+0xd3/0x290 [ 439.635144][T28245] ? minix_mount+0x40/0x40 [ 439.639567][T28245] ? minix_bmap+0x30/0x30 [ 439.643899][T28245] minix_mount+0x2d/0x40 [ 439.648207][T28245] legacy_get_tree+0x70/0xc0 [ 439.652808][T28245] vfs_get_tree+0x4a/0x1a0 [ 439.657228][T28245] path_mount+0x11b9/0x1c00 [ 439.661738][T28245] __se_sys_mount+0x23d/0x2e0 [ 439.666540][T28245] __x64_sys_mount+0x63/0x70 [ 439.671219][T28245] do_syscall_64+0x39/0x80 [ 439.675666][T28245] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 439.681614][T28245] RIP: 0033:0x46797a [ 439.685506][T28245] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 439.705206][T28245] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.713619][T28245] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 439.721853][T28245] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 439.729833][T28245] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 439.737812][T28245] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 439.745912][T28245] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:07 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 439.807098][T28242] loop5: detected capacity change from 0 to 256 [ 439.846440][T28242] MINIX-fs: bad superblock or unable to read bitmaps 01:45:07 executing program 2: syz_open_procfs(0x0, 0x0) setresuid(0xee01, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='nl80211\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5], 0x0, 0x0, 0xffffffffffffffff, 0x14, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) syz_mount_image$msdos(0x0, &(0x7f00000015c0)='./bus\x00', 0x0, 0x4, &(0x7f00000059c0)=[{&(0x7f0000001600)}, {&(0x7f0000005b00)}, {0x0}, {0x0, 0x0, 0x4}], 0x0, &(0x7f00000047c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) 01:45:07 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) recvmsg$kcm(r3, &(0x7f0000010840)={&(0x7f0000010300)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa08a, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x22, &(0x7f0000000240)=""/34, 0x40f00, 0x4, [], r4, 0x9, r2, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x6, 0x4}, 0x10, 0x0, r5}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x5, 0x9, 0x80, 0x832, 0xffffffffffffffff, 0x2, [], r4, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x40) 01:45:07 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:07 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:07 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:07 executing program 2: syz_open_procfs(0x0, 0x0) setresuid(0xee01, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='nl80211\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5], 0x0, 0x0, 0xffffffffffffffff, 0x14, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) syz_mount_image$msdos(0x0, &(0x7f00000015c0)='./bus\x00', 0x0, 0x4, &(0x7f00000059c0)=[{&(0x7f0000001600)}, {&(0x7f0000005b00)}, {0x0}, {0x0, 0x0, 0x4}], 0x0, &(0x7f00000047c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) [ 440.394744][T28298] loop1: detected capacity change from 0 to 4 [ 440.424080][T28298] FAULT_INJECTION: forcing a failure. [ 440.424080][T28298] name failslab, interval 1, probability 0, space 0, times 0 [ 440.436983][T28298] CPU: 0 PID: 28298 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 440.445816][T28298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.456111][T28298] Call Trace: [ 440.459585][T28298] dump_stack+0x137/0x19d [ 440.463945][T28298] should_fail+0x23c/0x250 [ 440.465496][T28299] loop5: detected capacity change from 0 to 1024 [ 440.468364][T28298] __should_failslab+0x81/0x90 [ 440.468389][T28298] should_failslab+0x5/0x20 [ 440.484208][T28298] kmem_cache_alloc_node_trace+0x5b/0x310 [ 440.489987][T28298] ? __kmalloc_node+0x30/0x40 [ 440.494698][T28298] __kmalloc_node+0x30/0x40 [ 440.499216][T28298] kvmalloc_node+0x81/0xf0 [ 440.503660][T28298] __list_lru_init+0x1dd/0x520 [ 440.508461][T28298] alloc_super+0x4bf/0x520 [ 440.512886][T28298] ? mount_bdev+0x290/0x290 [ 440.517389][T28298] sget+0x189/0x370 [ 440.521224][T28298] ? test_bdev_super+0x30/0x30 [ 440.526346][T28298] mount_bdev+0xd3/0x290 [ 440.530585][T28298] ? minix_mount+0x40/0x40 [ 440.535012][T28298] ? minix_bmap+0x30/0x30 [ 440.539355][T28298] minix_mount+0x2d/0x40 [ 440.543601][T28298] legacy_get_tree+0x70/0xc0 [ 440.548248][T28298] vfs_get_tree+0x4a/0x1a0 [ 440.552685][T28298] path_mount+0x11b9/0x1c00 [ 440.557210][T28298] __se_sys_mount+0x23d/0x2e0 [ 440.561889][T28298] __x64_sys_mount+0x63/0x70 [ 440.566482][T28298] do_syscall_64+0x39/0x80 [ 440.570904][T28298] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.576819][T28298] RIP: 0033:0x46797a [ 440.580740][T28298] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 440.600628][T28298] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 440.609047][T28298] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 440.617124][T28298] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 440.625206][T28298] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 440.633184][T28298] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 01:45:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)) [ 440.641160][T28298] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:08 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:08 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:08 executing program 2: syz_open_procfs(0x0, 0x0) setresuid(0xee01, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='nl80211\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5], 0x0, 0x0, 0xffffffffffffffff, 0x14, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) syz_mount_image$msdos(0x0, &(0x7f00000015c0)='./bus\x00', 0x0, 0x4, &(0x7f00000059c0)=[{&(0x7f0000001600)}, {&(0x7f0000005b00)}, {0x0}, {0x0, 0x0, 0x4}], 0x0, &(0x7f00000047c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) 01:45:08 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, 0x0, &(0x7f0000000300)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 440.881659][T28299] MINIX-fs: bad superblock or unable to read bitmaps [ 440.914598][T28319] loop1: detected capacity change from 0 to 4 01:45:08 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, 0x0, &(0x7f0000000300)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:08 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, 0x0, &(0x7f0000000300)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 440.992002][T28299] loop5: detected capacity change from 0 to 1024 [ 441.013949][T28319] FAULT_INJECTION: forcing a failure. [ 441.013949][T28319] name failslab, interval 1, probability 0, space 0, times 0 [ 441.113977][T28299] MINIX-fs: bad superblock or unable to read bitmaps [ 441.123968][T28319] CPU: 0 PID: 28319 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 441.132932][T28319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.143077][T28319] Call Trace: [ 441.146380][T28319] dump_stack+0x137/0x19d [ 441.150989][T28319] should_fail+0x23c/0x250 [ 441.155409][T28319] ? mempool_alloc_slab+0x16/0x20 [ 441.160453][T28319] __should_failslab+0x81/0x90 [ 441.165217][T28319] should_failslab+0x5/0x20 [ 441.169875][T28319] kmem_cache_alloc+0x46/0x320 [ 441.174749][T28319] mempool_alloc_slab+0x16/0x20 [ 441.181121][T28319] ? mempool_free+0x130/0x130 [ 441.185885][T28319] mempool_alloc+0x8c/0x300 [ 441.190395][T28319] ? _raw_spin_unlock+0x22/0x40 [ 441.195322][T28319] bio_alloc_bioset+0xcc/0x480 [ 441.200590][T28319] ? __find_get_block+0x545/0x640 [ 441.205781][T28319] submit_bh_wbc+0x134/0x3b0 [ 441.210551][T28319] ? __getblk_gfp+0x14e/0x1f0 [ 441.215235][T28319] __bread_gfp+0x110/0x220 [ 441.219682][T28319] minix_fill_super+0xbe/0xdc0 [ 441.224459][T28319] ? snprintf+0x6f/0x90 [ 441.228630][T28319] ? register_shrinker_prepared+0xdf/0xf0 [ 441.234446][T28319] ? set_blocksize+0x197/0x2a0 [ 441.239427][T28319] mount_bdev+0x1e8/0x290 [ 441.243810][T28319] ? minix_mount+0x40/0x40 [ 441.248279][T28319] ? minix_bmap+0x30/0x30 [ 441.252657][T28319] minix_mount+0x2d/0x40 [ 441.256912][T28319] legacy_get_tree+0x70/0xc0 [ 441.261524][T28319] vfs_get_tree+0x4a/0x1a0 [ 441.265959][T28319] path_mount+0x11b9/0x1c00 [ 441.270461][T28319] __se_sys_mount+0x23d/0x2e0 [ 441.275160][T28319] __x64_sys_mount+0x63/0x70 [ 441.279850][T28319] do_syscall_64+0x39/0x80 [ 441.284309][T28319] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 441.290299][T28319] RIP: 0033:0x46797a [ 441.294185][T28319] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 441.313803][T28319] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.322265][T28319] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 441.330383][T28319] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 441.338538][T28319] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 441.346520][T28319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 441.355105][T28319] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:09 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) recvmsg$kcm(r3, &(0x7f0000010840)={&(0x7f0000010300)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa08a, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x22, &(0x7f0000000240)=""/34, 0x40f00, 0x4, [], r4, 0x9, r2, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x6, 0x4}, 0x10, 0x0, r5}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x5, 0x9, 0x80, 0x832, 0xffffffffffffffff, 0x2, [], r4, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x40) 01:45:09 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x80040, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:09 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)) [ 441.367310][T28319] MINIX-fs: bad superblock or unable to read bitmaps 01:45:09 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:09 executing program 2: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 01:45:09 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 441.568747][T28361] loop5: detected capacity change from 0 to 1024 01:45:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)) 01:45:09 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='console\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x884) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 441.622693][T28364] loop1: detected capacity change from 0 to 4 [ 441.652740][T28364] FAULT_INJECTION: forcing a failure. [ 441.652740][T28364] name failslab, interval 1, probability 0, space 0, times 0 [ 441.665599][T28364] CPU: 0 PID: 28364 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 441.674415][T28364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.684665][T28364] Call Trace: [ 441.687953][T28364] dump_stack+0x137/0x19d [ 441.692341][T28364] should_fail+0x23c/0x250 [ 441.696763][T28364] __should_failslab+0x81/0x90 [ 441.701579][T28364] should_failslab+0x5/0x20 [ 441.706174][T28364] kmem_cache_alloc_node+0x56/0x310 [ 441.711374][T28364] ? create_task_io_context+0x36/0x1e0 [ 441.716858][T28364] ? xas_store+0x7cd/0xcf0 [ 441.721313][T28364] create_task_io_context+0x36/0x1e0 [ 441.726599][T28364] submit_bio_checks+0xa77/0xb90 [ 441.731567][T28364] ? xas_nomem+0x3d/0x110 [ 441.735913][T28364] ? mempool_alloc_slab+0x16/0x20 [ 441.740942][T28364] ? kmem_cache_alloc+0x1b4/0x320 [ 441.745974][T28364] ? mempool_alloc_slab+0x16/0x20 [ 441.751033][T28364] submit_bio_noacct+0x33/0x9a0 [ 441.755993][T28364] ? mempool_alloc_slab+0x16/0x20 [ 441.761186][T28364] ? mempool_free+0x130/0x130 [ 441.765861][T28364] ? mempool_alloc+0x99/0x300 [ 441.770645][T28364] ? __rcu_read_unlock+0x45/0x250 [ 441.777686][T28364] ? __bio_add_page+0x1a3/0x210 [ 441.780695][T28361] MINIX-fs: bad superblock or unable to read bitmaps [ 441.782717][T28364] submit_bio+0x200/0x370 [ 441.793821][T28364] ? bio_add_page+0x1fc/0x260 [ 441.798587][T28364] ? bio_alloc_bioset+0x408/0x480 [ 441.803632][T28364] submit_bh_wbc+0x36b/0x3b0 [ 441.808225][T28364] __bread_gfp+0x110/0x220 [ 441.813677][T28364] minix_fill_super+0xbe/0xdc0 [ 441.818479][T28364] ? snprintf+0x6f/0x90 [ 441.822739][T28364] ? register_shrinker_prepared+0xdf/0xf0 [ 441.828455][T28364] ? set_blocksize+0x197/0x2a0 [ 441.833261][T28364] mount_bdev+0x1e8/0x290 [ 441.837584][T28364] ? minix_mount+0x40/0x40 [ 441.842003][T28364] ? minix_bmap+0x30/0x30 [ 441.846365][T28364] minix_mount+0x2d/0x40 [ 441.850677][T28364] legacy_get_tree+0x70/0xc0 [ 441.855349][T28364] vfs_get_tree+0x4a/0x1a0 [ 441.859794][T28364] path_mount+0x11b9/0x1c00 [ 441.864293][T28364] __se_sys_mount+0x23d/0x2e0 [ 441.868966][T28364] __x64_sys_mount+0x63/0x70 [ 441.873710][T28364] do_syscall_64+0x39/0x80 [ 441.878121][T28364] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 441.884176][T28364] RIP: 0033:0x46797a [ 441.888063][T28364] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 441.907699][T28364] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.916107][T28364] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 441.924179][T28364] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 441.932155][T28364] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 441.940841][T28364] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 441.948815][T28364] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:09 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 441.970915][T28364] MINIX-fs: bad superblock or unable to read bitmaps 01:45:09 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 441.998111][T28380] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 01:45:09 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 442.063244][T28361] loop5: detected capacity change from 0 to 1024 [ 442.127848][T28391] loop1: detected capacity change from 0 to 4 [ 442.241621][T28391] FAULT_INJECTION: forcing a failure. [ 442.241621][T28391] name failslab, interval 1, probability 0, space 0, times 0 [ 442.344474][T28391] CPU: 0 PID: 28391 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 442.353335][T28391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.363391][T28391] Call Trace: [ 442.366727][T28391] dump_stack+0x137/0x19d [ 442.371068][T28391] should_fail+0x23c/0x250 [ 442.375540][T28391] __should_failslab+0x81/0x90 [ 442.380318][T28391] ? minix_fill_super+0x68b/0xdc0 [ 442.385346][T28391] should_failslab+0x5/0x20 [ 442.389855][T28391] __kmalloc+0x66/0x380 01:45:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) recvmsg$kcm(r3, &(0x7f0000010840)={&(0x7f0000010300)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa08a, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x22, &(0x7f0000000240)=""/34, 0x40f00, 0x4, [], r4, 0x9, r2, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x6, 0x4}, 0x10, 0x0, r5}, 0x78) [ 442.394020][T28391] minix_fill_super+0x68b/0xdc0 [ 442.398882][T28391] mount_bdev+0x1e8/0x290 [ 442.403253][T28391] ? minix_mount+0x40/0x40 [ 442.407702][T28391] ? minix_bmap+0x30/0x30 [ 442.412119][T28391] minix_mount+0x2d/0x40 [ 442.416398][T28391] legacy_get_tree+0x70/0xc0 [ 442.421075][T28391] vfs_get_tree+0x4a/0x1a0 [ 442.425594][T28391] path_mount+0x11b9/0x1c00 [ 442.430100][T28391] __se_sys_mount+0x23d/0x2e0 [ 442.435912][T28391] __x64_sys_mount+0x63/0x70 [ 442.440553][T28391] do_syscall_64+0x39/0x80 [ 442.445066][T28391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 442.451002][T28391] RIP: 0033:0x46797a [ 442.454890][T28391] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 442.474596][T28391] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 442.483005][T28391] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 442.490992][T28391] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f50ffcfe000 [ 442.498998][T28391] RBP: 00007f50ffcfe040 R08: 00007f50ffcfe040 R09: 0000000020000000 [ 442.507117][T28391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 442.515149][T28391] R13: 0000000020000100 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 442.583531][T28391] MINIX-fs: can't allocate map [ 442.615748][T28361] MINIX-fs: bad superblock or unable to read bitmaps 01:45:10 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:10 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='console\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x884) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 01:45:10 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)) 01:45:10 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 442.811989][T28409] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 442.829464][T28412] loop1: detected capacity change from 0 to 4 01:45:10 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='console\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x884) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 442.855525][T28412] MINIX-fs: bad superblock or unable to read bitmaps [ 442.879655][T28412] FAULT_INJECTION: forcing a failure. [ 442.879655][T28412] name failslab, interval 1, probability 0, space 0, times 0 [ 442.892530][T28412] CPU: 1 PID: 28412 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 01:45:10 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 442.901310][T28412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.911452][T28412] Call Trace: [ 442.914737][T28412] dump_stack+0x137/0x19d [ 442.922032][T28412] should_fail+0x23c/0x250 [ 442.926470][T28412] __should_failslab+0x81/0x90 [ 442.931254][T28412] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 442.936981][T28412] should_failslab+0x5/0x20 [ 442.941633][T28412] __kmalloc+0x66/0x380 [ 442.945882][T28412] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 442.951351][T28412] tomoyo_realpath_from_path+0x98/0x3b0 [ 442.956997][T28412] tomoyo_path_number_perm+0xc1/0x2d0 [ 442.962460][T28412] ? __rcu_read_unlock+0x5c/0x250 [ 442.967489][T28412] tomoyo_file_ioctl+0x1c/0x20 [ 442.972256][T28412] security_file_ioctl+0x45/0x90 [ 442.977195][T28412] __se_sys_ioctl+0x48/0x140 [ 442.981784][T28412] __x64_sys_ioctl+0x3f/0x50 [ 442.986388][T28412] do_syscall_64+0x39/0x80 [ 442.990876][T28412] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 442.996800][T28412] RIP: 0033:0x466217 [ 443.000706][T28412] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 443.020320][T28412] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.028810][T28412] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466217 [ 443.037993][T28412] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 443.045958][T28412] RBP: 00007f50ffcfe6bc R08: 00007f50ffcfe040 R09: 0000000020000000 [ 443.054006][T28412] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 443.062028][T28412] R13: 0000000000000016 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 443.088150][T28419] loop5: detected capacity change from 0 to 8192 01:45:10 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 443.128149][T28412] ERROR: Out of memory at tomoyo_realpath_from_path. 01:45:10 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 443.215485][T28427] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 01:45:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r2}) recvmsg$kcm(r2, &(0x7f0000010840)={&(0x7f0000010300)=@can, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) 01:45:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67d}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r4 = socket(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8936, &(0x7f0000000380)={@dev={0xfe, 0x80, [], 0x26}, 0x7d}) getsockopt$sock_buf(r4, 0x1, 0x0, &(0x7f0000000380)=""/110, &(0x7f00000001c0)=0x6e) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0xd00000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x2ffff, 0x0) 01:45:11 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='console\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x884) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 443.382737][T28435] loop1: detected capacity change from 0 to 4 [ 443.422894][T28435] MINIX-fs: bad superblock or unable to read bitmaps [ 443.489682][T28435] FAULT_INJECTION: forcing a failure. [ 443.489682][T28435] name failslab, interval 1, probability 0, space 0, times 0 [ 443.513308][T28443] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 443.521784][T28435] CPU: 1 PID: 28435 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 443.530564][T28435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.540620][T28435] Call Trace: [ 443.543895][T28435] dump_stack+0x137/0x19d [ 443.548232][T28435] should_fail+0x23c/0x250 [ 443.552649][T28435] __should_failslab+0x81/0x90 [ 443.557476][T28435] ? tomoyo_encode2+0x1d3/0x350 [ 443.562594][T28435] should_failslab+0x5/0x20 [ 443.567111][T28435] __kmalloc+0x66/0x380 [ 443.571391][T28435] tomoyo_encode2+0x1d3/0x350 [ 443.576433][T28435] tomoyo_realpath_from_path+0x35e/0x3b0 [ 443.582079][T28435] tomoyo_path_number_perm+0xc1/0x2d0 [ 443.587566][T28435] ? __rcu_read_unlock+0x5c/0x250 [ 443.592676][T28435] tomoyo_file_ioctl+0x1c/0x20 [ 443.597463][T28435] security_file_ioctl+0x45/0x90 [ 443.602455][T28435] __se_sys_ioctl+0x48/0x140 [ 443.607095][T28435] __x64_sys_ioctl+0x3f/0x50 [ 443.611685][T28435] do_syscall_64+0x39/0x80 [ 443.616146][T28435] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 443.622254][T28435] RIP: 0033:0x466217 [ 443.626264][T28435] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 443.645885][T28435] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.654403][T28435] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466217 [ 443.662376][T28435] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 443.670471][T28435] RBP: 00007f50ffcfe6bc R08: 00007f50ffcfe040 R09: 0000000020000000 [ 443.678480][T28435] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 443.689077][T28435] R13: 0000000000000016 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 443.767983][T28435] ERROR: Out of memory at tomoyo_realpath_from_path. [ 444.563454][T28419] MINIX-fs: bad superblock or unable to read bitmaps 01:45:12 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:12 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 01:45:12 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:12 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x101000}]) 01:45:12 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r2}) recvmsg$kcm(r2, &(0x7f0000010840)={&(0x7f0000010300)=@can, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 444.731320][T28458] loop1: detected capacity change from 0 to 4 [ 444.754876][ T37] audit: type=1800 audit(1617414312.390:303): pid=28459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15649 res=0 errno=0 [ 444.788661][T28458] MINIX-fs: bad superblock or unable to read bitmaps [ 444.843559][ T37] audit: type=1800 audit(1617414312.390:304): pid=28459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15649 res=0 errno=0 [ 444.865894][T28458] FAULT_INJECTION: forcing a failure. [ 444.865894][T28458] name failslab, interval 1, probability 0, space 0, times 0 [ 444.887361][T28458] CPU: 0 PID: 28458 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 444.896145][T28458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.906205][T28458] Call Trace: [ 444.909479][T28458] dump_stack+0x137/0x19d [ 444.913814][T28458] should_fail+0x23c/0x250 [ 444.918243][T28458] __should_failslab+0x81/0x90 [ 444.923024][T28458] ? kobject_uevent_env+0x1a7/0xc40 [ 444.928328][T28458] should_failslab+0x5/0x20 [ 444.932878][T28458] kmem_cache_alloc_trace+0x49/0x340 [ 444.938157][T28458] ? ___cache_free+0x3c/0x2f0 [ 444.942834][T28458] ? dev_uevent_filter+0x70/0x70 [ 444.947923][T28458] kobject_uevent_env+0x1a7/0xc40 [ 444.953013][T28458] ? kernfs_put+0x2f1/0x300 [ 444.957518][T28458] kobject_uevent+0x18/0x20 [ 444.962015][T28458] __loop_clr_fd+0x41c/0x630 [ 444.966689][T28458] lo_ioctl+0x9eb/0x11f0 [ 444.970927][T28458] ? ___cache_free+0x3c/0x2f0 [ 444.975599][T28458] ? kfree+0xf0/0x1e0 [ 444.979599][T28458] ? __srcu_read_unlock+0x1f/0x40 [ 444.984622][T28458] ? tomoyo_path_number_perm+0x286/0x2d0 [ 444.990358][T28458] ? blkdev_common_ioctl+0xa36/0x10a0 [ 444.995779][T28458] ? lo_release+0x120/0x120 [ 445.000462][T28458] blkdev_ioctl+0x1d0/0x3c0 [ 445.005196][T28458] block_ioctl+0x6d/0x80 [ 445.009442][T28458] ? blkdev_iopoll+0x70/0x70 [ 445.014091][T28458] __se_sys_ioctl+0xcb/0x140 [ 445.018738][T28458] __x64_sys_ioctl+0x3f/0x50 [ 445.023410][T28458] do_syscall_64+0x39/0x80 [ 445.027839][T28458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.033796][T28458] RIP: 0033:0x466217 [ 445.037698][T28458] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 445.057433][T28458] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.065848][T28458] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466217 [ 445.073840][T28458] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 445.081899][T28458] RBP: 00007f50ffcfe6bc R08: 00007f50ffcfe040 R09: 0000000020000000 01:45:12 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 445.090057][T28458] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 445.098117][T28458] R13: 0000000000000016 R14: 00007f50ffcfe000 R15: 0000000020011500 [ 445.113800][T28475] loop5: detected capacity change from 0 to 28799 01:45:12 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x101000}]) 01:45:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000c04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004105) sendfile(r1, r3, 0x0, 0x100000000) 01:45:12 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 445.248574][ T37] audit: type=1800 audit(1617414312.890:305): pid=28482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15644 res=0 errno=0 [ 445.272143][ T37] audit: type=1800 audit(1617414312.910:306): pid=28482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15644 res=0 errno=0 01:45:12 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:13 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) [ 445.358109][T28486] loop1: detected capacity change from 0 to 4 [ 445.380979][T28486] MINIX-fs: bad superblock or unable to read bitmaps [ 445.428094][T28486] FAULT_INJECTION: forcing a failure. [ 445.428094][T28486] name failslab, interval 1, probability 0, space 0, times 0 [ 445.428151][T28486] CPU: 0 PID: 28486 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 445.428172][T28486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.428183][T28486] Call Trace: [ 445.428192][T28486] dump_stack+0x137/0x19d [ 445.428218][T28486] should_fail+0x23c/0x250 [ 445.428237][T28486] __should_failslab+0x81/0x90 [ 445.428256][T28486] ? kobject_uevent_env+0x1a7/0xc40 [ 445.428284][T28486] should_failslab+0x5/0x20 [ 445.428450][T28486] kmem_cache_alloc_trace+0x49/0x340 [ 445.428545][T28486] ? ___cache_free+0x3c/0x2f0 [ 445.428564][T28486] ? dev_uevent_filter+0x70/0x70 [ 445.428586][T28486] kobject_uevent_env+0x1a7/0xc40 [ 445.428605][T28486] ? kernfs_put+0x2f1/0x300 [ 445.428631][T28486] kobject_uevent+0x18/0x20 [ 445.428648][T28486] __loop_clr_fd+0x41c/0x630 [ 445.428669][T28486] lo_ioctl+0x9eb/0x11f0 [ 445.428761][T28486] ? ___cache_free+0x3c/0x2f0 [ 445.428782][T28486] ? kfree+0xf0/0x1e0 [ 445.428798][T28486] ? __srcu_read_unlock+0x1f/0x40 [ 445.428820][T28486] ? tomoyo_path_number_perm+0x286/0x2d0 [ 445.428874][T28486] ? blkdev_common_ioctl+0xa36/0x10a0 [ 445.428912][T28486] ? lo_release+0x120/0x120 [ 445.428999][T28486] blkdev_ioctl+0x1d0/0x3c0 [ 445.429023][T28486] block_ioctl+0x6d/0x80 [ 445.429048][T28486] ? blkdev_iopoll+0x70/0x70 [ 445.429072][T28486] __se_sys_ioctl+0xcb/0x140 [ 445.429096][T28486] __x64_sys_ioctl+0x3f/0x50 [ 445.429155][T28486] do_syscall_64+0x39/0x80 [ 445.429178][T28486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.429238][T28486] RIP: 0033:0x466217 [ 445.429254][T28486] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 445.429282][T28486] RSP: 002b:00007f50ffcfdfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.429303][T28486] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466217 [ 445.429316][T28486] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 445.429328][T28486] RBP: 00007f50ffcfe6bc R08: 00007f50ffcfe040 R09: 0000000020000000 [ 445.429341][T28486] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 445.429400][T28486] R13: 0000000000000016 R14: 00007f50ffcfe000 R15: 0000000020011500 01:45:16 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:16 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x101000}]) 01:45:16 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:16 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', 0x0, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 01:45:16 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r2}) recvmsg$kcm(r2, &(0x7f0000010840)={&(0x7f0000010300)=@can, 0x80, &(0x7f0000010780)=[{&(0x7f0000010380)=""/108, 0x6c}, {&(0x7f0000010400)=""/63, 0x3f}, {&(0x7f0000010440)=""/25, 0x19}, {&(0x7f0000010480)=""/211, 0xd3}, {&(0x7f0000010580)=""/7, 0x7}, {0x0}, {&(0x7f00000106c0)=""/144, 0x90}], 0x7, &(0x7f0000010800)=""/56, 0x38}, 0x40000000) 01:45:16 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:45:16 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x101000}]) 01:45:16 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 448.315970][T28475] MINIX-fs: bad superblock or unable to read bitmaps [ 448.435696][T28510] loop1: detected capacity change from 0 to 4 [ 448.459074][ T37] audit: type=1800 audit(1617414316.100:307): pid=28511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15667 res=0 errno=0 [ 448.460313][ T37] audit: type=1800 audit(1617414316.100:308): pid=28511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15667 res=0 errno=0 [ 448.496239][T28510] MINIX-fs: bad superblock or unable to read bitmaps [ 448.499069][T28510] FAULT_INJECTION: forcing a failure. [ 448.499069][T28510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 448.499092][T28510] CPU: 1 PID: 28510 Comm: syz-executor.1 Not tainted 5.12.0-rc5-syzkaller #0 [ 448.499112][T28510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.499123][T28510] Call Trace: [ 448.499131][T28510] dump_stack+0x137/0x19d [ 448.499245][T28510] should_fail+0x23c/0x250 [ 448.499264][T28510] should_fail_usercopy+0x16/0x20 [ 448.499282][T28510] _copy_to_user+0x1c/0x90 [ 448.499304][T28510] simple_read_from_buffer+0xab/0x120 [ 448.499329][T28510] proc_fail_nth_read+0xf6/0x140 [ 448.499396][T28510] ? rw_verify_area+0x136/0x250 [ 448.499420][T28510] ? proc_fault_inject_write+0x200/0x200 [ 448.499442][T28510] vfs_read+0x154/0x5d0 [ 448.499463][T28510] ? __fget_light+0x219/0x260 [ 448.499502][T28510] ksys_read+0xce/0x180 [ 448.499604][T28510] __x64_sys_read+0x3e/0x50 [ 448.499688][T28510] do_syscall_64+0x39/0x80 [ 448.499707][T28510] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 448.499815][T28510] RIP: 0033:0x4191dc [ 448.499830][T28510] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 448.499847][T28510] RSP: 002b:00007f50ffcfe170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 448.499929][T28510] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191dc [ 448.499943][T28510] RDX: 000000000000000f RSI: 00007f50ffcfe1e0 RDI: 0000000000000003 [ 448.499957][T28510] RBP: 00007f50ffcfe1d0 R08: 0000000000000000 R09: 0000000020000000 [ 448.499971][T28510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 448.499983][T28510] R13: 00007ffe08e7907f R14: 00007f50ffcfe300 R15: 0000000000022000 [ 448.730759][ T37] audit: type=1800 audit(1617414316.370:309): pid=28523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15664 res=0 errno=0 [ 448.733158][ T37] audit: type=1800 audit(1617414316.370:310): pid=28523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15664 res=0 errno=0 [ 448.739326][T28525] loop1: detected capacity change from 0 to 4 [ 448.745208][T28525] MINIX-fs: bad superblock or unable to read bitmaps [ 448.781462][T28527] loop5: detected capacity change from 0 to 32768 01:45:19 executing program 2: timer_create(0x0, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0/../file0\x00', 0x419302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x1, 0x400fa7f, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894c, &(0x7f0000000080)='ip6tnl0\x00') openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 01:45:19 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) 01:45:19 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x405}, 0x14}}, 0x0) [ 452.378108][T28544] loop1: detected capacity change from 0 to 4 [ 452.384591][T28543] loop2: detected capacity change from 0 to 512 [ 452.392653][T28527] MINIX-fs: bad superblock or unable to read bitmaps [ 452.393010][T28544] MINIX-fs: bad superblock or unable to read bitmaps [ 452.414771][T28548] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 452.453646][T28543] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 452.459827][T28544] loop1: detected capacity change from 0 to 4 01:45:20 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r2}) 01:45:20 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000000080)=""/162, 0xa2}, {&(0x7f0000000140)=""/76, 0x4c}, {&(0x7f00000001c0)=""/151, 0x97}], 0x4, 0x6, 0x5, 0x15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000380)={0x0, 'batadv_slave_1\x00', {0x4}, 0x8000}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @local}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x4}) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f00000002c0), &(0x7f0000000300)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) [ 452.501484][T28544] MINIX-fs: bad superblock or unable to read bitmaps [ 452.518877][T28548] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 01:45:20 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:20 executing program 0: r0 = add_key$keyring(&(0x7f0000001200)='keyring\x00', &(0x7f0000001240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000080)={0x0, "7745bc5c608bbd127550d19f50a354173f9ec3b794ad8323f41dc4d15779f11960ce5341f98ac66f0de6a5819c10e72e96704b62be8d1f42c4d811b6dfd48aea"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f0000001540)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, r1) 01:45:20 executing program 4: timer_create(0x0, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0/../file0\x00', 0x419302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x1, 0x400fa7f, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894c, &(0x7f0000000080)='ip6tnl0\x00') mount$fuse(0x0, 0x0, &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 01:45:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', 0x0}) 01:45:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) 01:45:20 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, 0x0, 0x20000044) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 452.786633][T28576] loop1: detected capacity change from 0 to 4 [ 452.855857][T28576] MINIX-fs: bad superblock or unable to read bitmaps [ 452.863231][T28579] loop4: detected capacity change from 0 to 512 [ 452.877801][T28589] loop5: detected capacity change from 0 to 65536 [ 452.888159][T28579] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:45:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf) [ 452.953908][T28576] loop1: detected capacity change from 0 to 4 [ 453.019286][T28576] MINIX-fs: bad superblock or unable to read bitmaps 01:45:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000080)={@dev, @rand_addr=0x64010102}, 0xc) [ 457.024169][T28589] MINIX-fs: deleted inode referenced: 1 [ 457.030379][T28589] MINIX-fs: get root inode failed 01:45:24 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0x1000, 0x4) 01:45:24 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:24 executing program 4: timer_create(0x0, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0/../file0\x00', 0x419302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x1, 0x400fa7f, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894c, &(0x7f0000000080)='ip6tnl0\x00') mount$fuse(0x0, 0x0, &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 01:45:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xa, &(0x7f0000000000)={0x0, {{0x2, 0x0, @dev}}}, 0x3) 01:45:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$kcm(0xa, 0x5, 0x0) 01:45:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x34, 0x0, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6a0e}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmp}]}, 0x34}}, 0x0) 01:45:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=@newsa={0x114, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0}, {@in=@local}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@address_filter={0x28, 0x1a, {@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}]}, 0x114}}, 0x0) [ 457.322343][T28637] loop5: detected capacity change from 0 to 66048 [ 457.347817][T28633] loop4: detected capacity change from 0 to 512 [ 457.347963][T28635] loop1: detected capacity change from 0 to 4 [ 457.419622][T28635] MINIX-fs: bad superblock or unable to read bitmaps [ 457.459509][T28633] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:45:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/ip_vs\x00') read$FUSE(r0, &(0x7f0000000800)={0x2020}, 0x2020) 01:45:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) [ 457.496341][T28635] loop1: detected capacity change from 0 to 4 [ 457.507014][T28635] MINIX-fs: bad superblock or unable to read bitmaps [ 457.526565][T28655] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 01:45:25 executing program 0: r0 = openat$nvram(0xffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x1c) 01:45:25 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 457.851104][T28669] loop1: detected capacity change from 0 to 4 [ 457.899065][T28669] MINIX-fs: bad superblock or unable to read bitmaps [ 458.007715][T28669] loop1: detected capacity change from 0 to 4 [ 458.019846][T28669] MINIX-fs: bad superblock or unable to read bitmaps [ 460.782587][T28637] MINIX-fs: deleted inode referenced: 1 [ 460.788190][T28637] MINIX-fs: get root inode failed 01:45:28 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000004340)={0x2, &(0x7f0000004300)=[{}, {0x5}]}) 01:45:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/ptype\x00') read$FUSE(r0, &(0x7f0000000800)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r1, 0x0) 01:45:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x9, 0x1, 0xffffff01, 0x1821, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x40) 01:45:28 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:28 executing program 4: timer_create(0x0, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0/../file0\x00', 0x419302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x1, 0x400fa7f, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894c, &(0x7f0000000080)='ip6tnl0\x00') mount$fuse(0x0, 0x0, &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 461.045090][T28699] loop4: detected capacity change from 0 to 512 [ 461.075377][T28702] loop1: detected capacity change from 0 to 4 01:45:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, 0x0) [ 461.092174][T28702] MINIX-fs: bad superblock or unable to read bitmaps [ 461.092393][T28699] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 461.110946][T28709] loop5: detected capacity change from 0 to 98304 01:45:28 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='.-{}\x00') 01:45:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000100)=""/245, &(0x7f0000000000)=0xf5) 01:45:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, 0x0, 0x0) [ 461.212584][T28702] loop1: detected capacity change from 0 to 4 [ 461.225910][T28702] MINIX-fs: bad superblock or unable to read bitmaps 01:45:28 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) [ 461.429481][T28735] loop1: detected capacity change from 0 to 4 [ 461.459303][T28735] MINIX-fs: bad superblock or unable to read bitmaps [ 461.514177][T28735] loop1: detected capacity change from 0 to 4 [ 461.523925][T28735] MINIX-fs: bad superblock or unable to read bitmaps [ 464.511362][T28709] MINIX-fs: deleted inode referenced: 1 [ 464.516958][T28709] MINIX-fs: get root inode failed 01:45:32 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:32 executing program 2: perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:45:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) sendmsg$inet(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000000c0)='A', 0x1}], 0x1}, 0x4041) 01:45:32 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60b193f300300000feca00000000000000000000000000bbff020000000000000000000000000001040090"], 0x0) 01:45:32 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:32 executing program 4: timer_create(0x0, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0/../file0\x00', 0x419302, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x1, 0x400fa7f, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x894c, &(0x7f0000000080)='ip6tnl0\x00') mount$fuse(0x0, 0x0, &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 01:45:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x9, "4b31dea4307f6bb915aa2695d7f4bc87bebccb88178aa49b498221fb7ba749c26fa111e50b7940f8be78cf67ba1afd8518fa97796961d0fafd70dbc9b303cf2ca45cafb55b213a8c4ec0f162c9a8196acb8c4ba4f1146a3e961477c658cb3310bda4954590e99e8ec8f169168070af22cdfc2e7458c62871c575b993ed736e014c5a1048fc7f07adeb8204ef4c1a99230ef06177e64f70049a349bc3d1eca43165117d43f237c49f09ded31b8244366945b725a9d6eac0dc363ac31177bc603a19c8b86244569a95fdb858aa29152b53f1b921f8e71f6ac67d46ead4f3b0e1ceffe9421193c522d139b9f32c684f3f9a5c7de4cd43205e4c5a36b42b6b1ba93ab741e17492109e6c5b103cd93ef126d5a8c089044c6115a12b191b62c681abb576322eb32723fa89fbc4d52e650f57f3701ed7e78d9728408a82168e53ab9c2221d6733705287faedfa0239a548c4d8bbdd743b36cd562cee79ae2427003c8d099680292e726e309b34b49158e053fb0eb152729d5978e363cf22d5fabf9b3447d182ffa24d3b389ad07e26198f95fa702e26132cc76ad191167c14d7f44c154b18113f570a017bd253202ee57cd9fbdeab502eb96afb14fa0efd25e8722d38d1578d21079fc7970f8fb1758c635b2952333fdd9e03d34b8719ffe125d19ead9e388f6bb35c0e36ad09a3aef5ad8c1fe7bdf1f0a2b93b86c4f554cdef67b5972"}) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) [ 464.772731][T28770] loop1: detected capacity change from 0 to 4 [ 464.781336][T28767] loop4: detected capacity change from 0 to 512 [ 464.791005][T28773] loop5: detected capacity change from 0 to 131072 01:45:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x9, "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"}) ioctl$VT_DISALLOCATE(r0, 0x5608) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x5, 0x6, 0x7f, 0x0, 0x0, 0xb7d, 0x80102, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x200a, 0x4, 0x0, 0x8, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) [ 464.825713][T28770] MINIX-fs: bad superblock or unable to read bitmaps [ 464.863958][T28767] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 464.912969][T28770] loop1: detected capacity change from 0 to 4 [ 464.931210][T28770] MINIX-fs: bad superblock or unable to read bitmaps 01:45:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 01:45:32 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[{0x28, 0x0, 0x0, "30ed382503452a96c69c176c4a097ce6ce"}], 0x28}, 0x0) [ 465.279527][T28816] loop1: detected capacity change from 0 to 4 [ 465.287533][T28816] MINIX-fs: bad superblock or unable to read bitmaps [ 465.342131][T28816] loop1: detected capacity change from 0 to 4 [ 465.350810][T28816] MINIX-fs: bad superblock or unable to read bitmaps [ 468.238528][T28773] MINIX-fs: deleted inode referenced: 1 [ 468.244152][T28773] MINIX-fs: get root inode failed 01:45:36 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:36 executing program 0: io_setup(0x32, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x5]}, 0x8}) 01:45:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:36 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 01:45:36 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:36 executing program 4: r0 = openat$zero(0xffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x11, &(0x7f0000000040)) 01:45:36 executing program 2: r0 = socket(0x2, 0xa, 0x0) getsockopt$sock_buf(r0, 0x1, 0x28, 0x0, &(0x7f0000000780)) [ 468.522536][T28846] loop1: detected capacity change from 0 to 4 [ 468.554220][T28846] MINIX-fs: bad superblock or unable to read bitmaps 01:45:36 executing program 4: openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x300, 0x0) [ 468.604930][T28853] loop5: detected capacity change from 0 to 163840 [ 468.629978][T28860] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 468.644959][T28846] loop1: detected capacity change from 0 to 4 01:45:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:36 executing program 0: r0 = socket(0x2, 0xa, 0x0) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000780)=0x7) 01:45:36 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'gretap0\x00'}) [ 468.683419][T28846] MINIX-fs: bad superblock or unable to read bitmaps 01:45:36 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) [ 468.845131][T28878] loop2: detected capacity change from 0 to 184 [ 471.718863][T28853] MINIX-fs: deleted inode referenced: 1 [ 471.724456][T28853] MINIX-fs: get root inode failed 01:45:39 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:39 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'gretap0\x00'}) 01:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:39 executing program 0: r0 = socket(0x2, 0xa, 0x0) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000780)=0x7) 01:45:39 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) 01:45:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:39 executing program 0: r0 = socket(0x2, 0xa, 0x0) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000780)=0x7) 01:45:39 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'gretap0\x00'}) [ 472.028216][T28905] loop2: detected capacity change from 0 to 184 [ 472.041729][T28907] loop1: detected capacity change from 0 to 4 [ 472.042329][T28909] loop5: detected capacity change from 0 to 196608 01:45:39 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) 01:45:39 executing program 0: r0 = socket(0x2, 0xa, 0x0) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000780)=0x7) 01:45:39 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'gretap0\x00'}) [ 472.084208][T28907] MINIX-fs: bad superblock or unable to read bitmaps [ 472.197426][T28907] loop1: detected capacity change from 0 to 4 [ 472.206215][T28907] MINIX-fs: bad superblock or unable to read bitmaps 01:45:39 executing program 4: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) [ 472.294284][T28932] loop2: detected capacity change from 0 to 184 [ 472.408370][T28940] loop4: detected capacity change from 0 to 184 [ 475.086629][T28909] MINIX-fs: deleted inode referenced: 1 [ 475.093539][T28909] MINIX-fs: get root inode failed 01:45:42 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:42 executing program 0: pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x5451, 0x0) 01:45:42 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:42 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) 01:45:42 executing program 4: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) 01:45:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:43 executing program 0: socketpair(0x3, 0x0, 0xfffffffc, &(0x7f0000000000)) 01:45:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x10) [ 475.376053][T28966] loop1: detected capacity change from 0 to 4 [ 475.395788][T28967] loop4: detected capacity change from 0 to 184 [ 475.403142][T28966] MINIX-fs: bad superblock or unable to read bitmaps [ 475.408032][T28969] loop2: detected capacity change from 0 to 184 [ 475.417791][T28970] loop5: detected capacity change from 0 to 197120 01:45:43 executing program 4: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000100)="8800170000000000001700080000000008007809140b2a57080200000100000101f952500701beef005252050181534c24", 0x31, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000600)='./file2\x00', 0x0, 0x0) 01:45:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) [ 475.492749][T28966] loop1: detected capacity change from 0 to 4 [ 475.502963][T28966] MINIX-fs: bad superblock or unable to read bitmaps 01:45:43 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x40, 0x0) [ 475.729417][T28999] ================================================================== [ 475.738117][T28999] BUG: KCSAN: data-race in wbt_issue / wbt_issue [ 475.744458][T28999] [ 475.746794][T28999] write to 0xffff8881026c5b28 of 8 bytes by task 2918 on cpu 1: [ 475.755377][T28999] wbt_issue+0xbd/0xd0 [ 475.760120][T28999] __rq_qos_issue+0x3b/0x70 [ 475.764640][T28999] blk_mq_start_request+0xd0/0x230 [ 475.769856][T28999] loop_queue_rq+0x3c/0x230 [ 475.774524][T28999] blk_mq_dispatch_rq_list+0x570/0xe80 [ 475.780464][T28999] blk_mq_do_dispatch_sched+0x370/0x610 [ 475.786032][T28999] __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 475.792301][T28999] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 475.798998][T28999] __blk_mq_run_hw_queue+0xc1/0x140 [ 475.804450][T28999] blk_mq_run_work_fn+0x3d/0x50 [ 475.809613][T28999] process_one_work+0x3e1/0x950 [ 475.814482][T28999] worker_thread+0x616/0xa70 [ 475.819317][T28999] kthread+0x20b/0x230 [ 475.823406][T28999] ret_from_fork+0x1f/0x30 [ 475.827875][T28999] [ 475.830408][T28999] read to 0xffff8881026c5b28 of 8 bytes by task 28999 on cpu 0: [ 475.839030][T28999] wbt_issue+0x76/0xd0 [ 475.843250][T28999] __rq_qos_issue+0x3b/0x70 [ 475.848008][T28999] blk_mq_start_request+0xd0/0x230 [ 475.853482][T28999] loop_queue_rq+0x3c/0x230 [ 475.858234][T28999] blk_mq_dispatch_rq_list+0x570/0xe80 [ 475.863786][T28999] blk_mq_do_dispatch_sched+0x370/0x610 [ 475.869434][T28999] __blk_mq_sched_dispatch_requests+0x1fd/0x2a0 [ 475.876027][T28999] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 475.882263][T28999] __blk_mq_run_hw_queue+0xc1/0x140 [ 475.887577][T28999] __blk_mq_delay_run_hw_queue+0x188/0x330 [ 475.893543][T28999] blk_mq_run_hw_queue+0x231/0x260 [ 475.898910][T28999] blk_mq_sched_insert_requests+0x144/0x210 [ 475.905224][T28999] blk_mq_flush_plug_list+0x2f5/0x400 [ 475.911191][T28999] blk_flush_plug_list+0x235/0x260 [ 475.916984][T28999] blk_finish_plug+0x44/0x60 [ 475.921881][T28999] read_pages+0x3aa/0x6e0 [ 475.926406][T28999] page_cache_ra_unbounded+0x46c/0x4c0 [ 475.932300][T28999] force_page_cache_ra+0x226/0x260 [ 475.937665][T28999] page_cache_sync_ra+0x178/0x1a0 [ 475.942793][T28999] filemap_get_pages+0x1ba/0x660 [ 475.947883][T28999] filemap_read+0x1ba/0x7b0 [ 475.952400][T28999] generic_file_read_iter+0x82/0x410 [ 475.957868][T28999] blkdev_read_iter+0xb3/0xc0 [ 475.963012][T28999] vfs_read+0x565/0x5d0 [ 475.967324][T28999] ksys_read+0xce/0x180 [ 475.971702][T28999] __x64_sys_read+0x3e/0x50 [ 475.976452][T28999] do_syscall_64+0x39/0x80 [ 475.980880][T28999] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 475.986977][T28999] [ 475.989306][T28999] Reported by Kernel Concurrency Sanitizer on: [ 475.995844][T28999] CPU: 0 PID: 28999 Comm: systemd-udevd Not tainted 5.12.0-rc5-syzkaller #0 [ 476.004758][T28999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.015000][T28999] ================================================================== [ 478.633741][T28970] MINIX-fs: deleted inode referenced: 1 [ 478.640178][T28970] MINIX-fs: get root inode failed 01:45:46 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:46 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 01:45:46 executing program 0: pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x4}, &(0x7f00000012c0)={0x3}, 0x0, &(0x7f0000001380)={&(0x7f0000001340)={[0x8001]}, 0x8}) 01:45:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000240)=""/132, 0x84}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000000)=""/32, 0x20}], 0x1) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) r5 = socket(0x1c, 0x5, 0x0) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) shutdown(r4, 0x0) 01:45:46 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:46 executing program 4: fcntl$lock(0xffffffffffffffff, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 01:45:46 executing program 0: pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x4}, &(0x7f00000012c0)={0x3}, 0x0, &(0x7f0000001380)={&(0x7f0000001340)={[0x8001]}, 0x8}) [ 478.888600][T29022] loop1: detected capacity change from 0 to 4 [ 478.917956][T29022] MINIX-fs: bad superblock or unable to read bitmaps 01:45:46 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:46 executing program 0: pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x4}, &(0x7f00000012c0)={0x3}, 0x0, &(0x7f0000001380)={&(0x7f0000001340)={[0x8001]}, 0x8}) [ 478.961148][T29030] loop5: detected capacity change from 0 to 229376 01:45:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000240)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@authinfo={0x10}], 0x10}, 0x0) [ 479.036679][T29022] loop1: detected capacity change from 0 to 4 [ 479.049912][T29022] MINIX-fs: bad superblock or unable to read bitmaps 01:45:46 executing program 0: pselect6(0x40, &(0x7f0000001240), &(0x7f0000001280)={0x4}, &(0x7f00000012c0)={0x3}, 0x0, &(0x7f0000001380)={&(0x7f0000001340)={[0x8001]}, 0x8}) [ 482.575907][T29030] MINIX-fs: deleted inode referenced: 1 [ 482.582183][T29030] MINIX-fs: get root inode failed 01:45:50 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:50 executing program 0: pselect6(0x0, 0x0, &(0x7f0000001280)={0x4}, &(0x7f00000012c0)={0x3}, 0x0, &(0x7f0000001380)={&(0x7f0000001340)={[0x8001]}, 0x8}) 01:45:50 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) 01:45:50 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000002740)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000002680)=[{0x10}], 0x10}, 0x0) 01:45:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = dup(r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000000), &(0x7f0000000040)=0x18) [ 482.825197][T29085] loop1: detected capacity change from 0 to 4 [ 482.845120][T29085] MINIX-fs: bad superblock or unable to read bitmaps 01:45:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000040)="708a6077d4a525d5e7131bff33e405c729340c91020aad6469f7210f7d5cbd8d86c0de60679f6b9ce9175246c6e6b8662e5c48c9c47fda3c89fa58b2e51183c82f6920092810fb11cd655588c3270c646d73f248a6e3d40484f5b201ea2edd70a896a104c74fabf6ce0d3ee0b7550303e69a7f1dee8a2fcc45980dde7d2034bdc1e570b5028d3439918014c4c476c95ee012202b674995d0c6cfd98636384b5f5bd46e2481f6e13bca5e38b159e189397dd847a89db96eea0ec871e8866c42577d8a96e6a5fc47b33513", 0xca, 0xc5, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x13) 01:45:50 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000380)='b', 0x1}], 0x1}, 0x4044047) 01:45:50 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56eff96e4d6b2d73833db6d649b2c77bc586297771901fdc9cbb3b25feda0ed3fcc84a15ea81497d94500a707cd4b524f8844f245779461df3228940bad6e2", 0x3e}, 0x60) [ 482.905738][T29096] loop5: detected capacity change from 0 to 262144 [ 482.945783][T29085] loop1: detected capacity change from 0 to 4 [ 482.981693][T29085] MINIX-fs: bad superblock or unable to read bitmaps 01:45:50 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) 01:45:50 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) 01:45:50 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="40002800016d26000600789e970b08107f13", 0x12, 0x400}], 0x0, &(0x7f0000011500)=ANY=[]) [ 483.220828][T29126] loop1: detected capacity change from 0 to 4 [ 483.260539][T29126] MINIX-fs: bad superblock or unable to read bitmaps [ 483.344655][T29126] loop1: detected capacity change from 0 to 4 [ 483.356047][T29126] MINIX-fs: bad superblock or unable to read bitmaps